qeeqbox / chameleonLinks
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
☆697Updated last year
Alternatives and similar repositories for chameleon
Users that are interested in chameleon are comparing it to the libraries listed below
Sorting:
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆798Updated 5 months ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆183Updated 2 years ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆646Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆193Updated last year
- A Holistic OSINT and Threat Hunting Platform☆525Updated 6 months ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆609Updated 2 years ago
- AIL framework - Analysis Information Leak framework☆759Updated last week
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆821Updated 3 weeks ago
- A query aggregator for OSINT based threat hunting☆903Updated this week
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆288Updated last year
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆935Updated last week
- fully automated pentesting tool☆512Updated 2 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆335Updated 2 years ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆452Updated 7 months ago
- ThePhish: an automated phishing email analysis tool☆1,246Updated 11 months ago
- Attack Surface Management since before Attack Surface Management was a thing☆649Updated this week
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆298Updated 2 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆769Updated 2 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆403Updated last year
- A modular OSINT honeypot for blue teamers☆336Updated 2 years ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆646Updated last year
- Automated Red Team Infrastructure deployement using Docker☆1,249Updated 2 years ago
- OWASP Honeypot, Automated Deception Framework.☆464Updated 10 months ago
- NERVE Continuous Vulnerability Scanner☆459Updated last year
- Malware analysis platform☆442Updated last year
- A tool to perform DNS reconnaissance on target networks. Among the DNS information got from include subdomains, mx records, web applicati…☆338Updated 10 months ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆576Updated this week
- Incident Response - Fast suspicious file finder☆243Updated 3 years ago
- E-Mail Header Analyzer☆679Updated 2 years ago