qeeqbox / chameleon
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
☆674Updated last year
Alternatives and similar repositories for chameleon:
Users that are interested in chameleon are comparing it to the libraries listed below
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆749Updated 3 weeks ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆178Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆183Updated last year
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆280Updated 10 months ago
- A modular OSINT honeypot for blue teamers☆331Updated last year
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆757Updated 7 months ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆639Updated last year
- A query aggregator for OSINT based threat hunting☆878Updated this week
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆886Updated last week
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆507Updated 4 months ago
- A Holistic OSINT and Threat Hunting Platform☆520Updated last month
- Digital Forensics Investigation Platform☆799Updated 4 months ago
- fully automated pentesting tool☆508Updated 2 years ago
- AIL framework - Analysis Information Leak framework☆685Updated this week
- DFIRTrack - The Incident Response Tracking Application☆491Updated 5 months ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆310Updated 2 years ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆580Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,223Updated 2 years ago
- Collaborative Malware Analysis Platform at Scale☆736Updated 3 weeks ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆635Updated 11 months ago
- Data leak checker & OSINT Tool☆536Updated 3 years ago
- Extract and aggregate threat intelligence.☆846Updated last year
- NERVE Continuous Vulnerability Scanner☆455Updated last year
- Incident Response - Fast suspicious file finder☆238Updated 2 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆700Updated 2 weeks ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆398Updated last year
- Ransomware leak site monitoring☆311Updated 2 years ago
- Sophos-originated indicators-of-compromise from published reports☆565Updated 2 weeks ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆424Updated 3 months ago
- Attack Surface Management since before Attack Surface Management was a thing☆634Updated this week