qeeqbox / chameleonLinks
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
☆700Updated 2 years ago
Alternatives and similar repositories for chameleon
Users that are interested in chameleon are comparing it to the libraries listed below
Sorting:
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆821Updated 7 months ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆198Updated 2 years ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆647Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆909Updated last week
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆628Updated last month
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆182Updated 2 years ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆1,002Updated last week
- A Holistic OSINT and Threat Hunting Platform☆527Updated 8 months ago
- AIL framework - Analysis Information Leak framework☆794Updated last week
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆882Updated 3 months ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆290Updated last year
- This project is a SIEM with SIRP and Threat Intel, all in one.☆463Updated 10 months ago
- ThePhish: an automated phishing email analysis tool☆1,269Updated last year
- Automated Red Team Infrastructure deployement using Docker☆1,249Updated 3 years ago
- A modular OSINT honeypot for blue teamers☆339Updated 2 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆793Updated 2 years ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆340Updated 2 years ago
- NERVE Continuous Vulnerability Scanner☆458Updated last year
- SniperPhish - The Web-Email Spear Phishing Toolkit☆605Updated 4 months ago
- fully automated pentesting tool☆516Updated 2 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆403Updated 2 weeks ago
- OSINT Template Engine☆553Updated 2 years ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆655Updated last year
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆301Updated 2 years ago
- CLI tool for open source and threat intelligence☆1,241Updated 6 months ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆593Updated this week
- Data leak checker & OSINT Tool☆568Updated 4 years ago
- OWASP Honeypot, Automated Deception Framework.☆462Updated last year
- Incident Response - Fast suspicious file finder☆244Updated 3 years ago