qeeqbox / chameleonLinks
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
☆710Updated 2 years ago
Alternatives and similar repositories for chameleon
Users that are interested in chameleon are comparing it to the libraries listed below
Sorting:
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆853Updated 10 months ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆653Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆205Updated 2 years ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆649Updated 4 months ago
- A Holistic OSINT and Threat Hunting Platform☆527Updated 10 months ago
- A query aggregator for OSINT based threat hunting☆918Updated last month
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆915Updated 5 months ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆191Updated 3 years ago
- AIL framework - Analysis Information Leak framework☆826Updated last week
- NERVE Continuous Vulnerability Scanner☆457Updated last year
- This project is a SIEM with SIRP and Threat Intel, all in one.☆464Updated last year
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆306Updated last year
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆257Updated 3 years ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,062Updated last week
- Automated Red Team Infrastructure deployement using Docker☆1,253Updated 3 years ago
- A modular OSINT honeypot for blue teamers☆342Updated 2 years ago
- fully automated pentesting tool☆517Updated 2 years ago
- ThePhish: an automated phishing email analysis tool☆1,294Updated last year
- Incident Response - Fast suspicious file finder☆246Updated 3 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆415Updated 2 months ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆342Updated 2 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆657Updated last week
- Malware analysis platform☆445Updated last year
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆804Updated 2 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆418Updated 2 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆606Updated last week
- SniperPhish - The Web-Email Spear Phishing Toolkit☆619Updated 6 months ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆656Updated last year
- Data leak checker & OSINT Tool☆569Updated 4 years ago
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆303Updated 2 years ago