qeeqbox / chameleon
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
☆661Updated last year
Related projects ⓘ
Alternatives and complementary repositories for chameleon
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆695Updated last month
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆169Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆162Updated last year
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆272Updated 7 months ago
- A Holistic OSINT and Threat Hunting Platform☆512Updated last year
- OSINT tool - gets data from services like shodan, censys etc. in one app☆637Updated last year
- A query aggregator for OSINT based threat hunting☆864Updated last week
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆730Updated 4 months ago
- AIL framework - Analysis Information Leak framework☆609Updated this week
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆560Updated last year
- OSINT Template Engine☆526Updated last year
- A modular OSINT honeypot for blue teamers☆329Updated last year
- NERVE Continuous Vulnerability Scanner☆456Updated 11 months ago
- OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits.☆285Updated 3 years ago
- fully automated pentesting tool☆504Updated last year
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆303Updated last year
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆279Updated last year
- Automated Red Team Infrastructure deployement using Docker☆1,212Updated 2 years ago
- Mass scan IPs for vulnerable services☆1,027Updated 2 years ago
- Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)☆441Updated last year
- Malware analysis platform☆422Updated 9 months ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆396Updated 10 months ago
- OSINT Tools for the Dark Web☆757Updated 5 months ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆624Updated 8 months ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆865Updated 2 weeks ago
- CLI tool for open source and threat intelligence☆1,175Updated 11 months ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆247Updated 2 years ago
- A passive subdomain finder☆326Updated last year
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆361Updated 2 years ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,080Updated last year