qeeqbox / honeypots
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)
☆773Updated 2 months ago
Alternatives and similar repositories for honeypots:
Users that are interested in honeypots are comparing it to the libraries listed below
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆680Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆184Updated last year
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆180Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆889Updated 2 weeks ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆908Updated last week
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆283Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,331Updated 5 months ago
- AIL framework - Analysis Information Leak framework☆720Updated last week
- Yet another Ransomware gang tracker☆415Updated this week
- Digital Forensics Investigation Platform☆816Updated 6 months ago
- Home of the dionaea honeypot☆739Updated 8 months ago
- Extract and aggregate threat intelligence.☆859Updated last year
- A Holistic OSINT and Threat Hunting Platform☆524Updated 3 months ago
- OWASP Honeypot, Automated Deception Framework.☆460Updated 7 months ago
- Your Everyday Threat Intelligence☆1,844Updated last week
- Open Source EDR for Windows☆1,211Updated 2 years ago
- Collaborative Incident Response platform☆1,180Updated last week
- Ransomware simulator written in Golang☆433Updated 2 years ago
- A centralized and enhanced memory analysis platform☆454Updated 2 months ago
- Malware Configuration And Payload Extraction☆2,363Updated this week
- Malware Sample Sources☆559Updated 4 years ago
- Automatically created C2 Feeds☆603Updated this week
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,408Updated 5 months ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆558Updated this week
- Live Feed of C2 servers, tools, and botnets☆621Updated this week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆710Updated 2 weeks ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆842Updated 4 years ago
- A curated list of awesome YARA rules, tools, and people.☆3,775Updated 3 weeks ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,003Updated this week
- ThePhish: an automated phishing email analysis tool☆1,210Updated 8 months ago