qeeqbox / chameleonLinks
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
☆691Updated last year
Alternatives and similar repositories for chameleon
Users that are interested in chameleon are comparing it to the libraries listed below
Sorting:
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆795Updated 4 months ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆183Updated 2 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆286Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆190Updated last year
- A query aggregator for OSINT based threat hunting☆899Updated this week
- A Holistic OSINT and Threat Hunting Platform☆526Updated 5 months ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆329Updated 2 years ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆929Updated last week
- A modular OSINT honeypot for blue teamers☆336Updated 2 years ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆607Updated 2 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆812Updated this week
- OSINT tool - gets data from services like shodan, censys etc. in one app☆646Updated 2 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆646Updated last year
- NERVE Continuous Vulnerability Scanner☆458Updated last year
- Ransomware leak site monitoring☆312Updated 3 years ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆447Updated 7 months ago
- AIL framework - Analysis Information Leak framework☆751Updated last week
- Extract and aggregate threat intelligence.☆868Updated last year
- Data leak checker & OSINT Tool☆552Updated 4 years ago
- Digital Forensics Investigation Platform☆830Updated 8 months ago
- CLI tool for open source and threat intelligence☆1,221Updated 4 months ago
- DFIRTrack - The Incident Response Tracking Application☆520Updated 9 months ago
- Attack Surface Management since before Attack Surface Management was a thing☆645Updated 2 weeks ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,270Updated 2 years ago
- fully automated pentesting tool☆512Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,248Updated 2 years ago
- Incident Response - Fast suspicious file finder☆242Updated 3 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆588Updated last month
- Collaborative Malware Analysis Platform at Scale☆747Updated 2 months ago