qeeqbox / honeypots
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)
☆722Updated 2 weeks ago
Alternatives and similar repositories for honeypots:
Users that are interested in honeypots are comparing it to the libraries listed below
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆670Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆168Updated last year
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆176Updated 2 years ago
- AIL framework - Analysis Information Leak framework☆643Updated this week
- ThePhish: an automated phishing email analysis tool☆1,178Updated 5 months ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆877Updated last week
- Open Source EDR for Windows☆1,168Updated last year
- A query aggregator for OSINT based threat hunting☆874Updated 2 weeks ago
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,612Updated 7 months ago
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,364Updated 2 months ago
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆733Updated this week
- Collaborative Incident Response platform☆1,111Updated this week
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆961Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,507Updated 6 months ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆418Updated 2 months ago
- Digging Deeper....☆3,063Updated this week
- Extract and aggregate threat intelligence.☆841Updated 11 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,277Updated 2 months ago
- Home of the dionaea honeypot☆723Updated 5 months ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆752Updated 6 months ago
- OWASP Honeypot, Automated Deception Framework.☆445Updated 4 months ago
- Live Feed of C2 servers, tools, and botnets☆560Updated this week
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆277Updated 9 months ago
- A website and framework for testing NIDS detection☆234Updated 3 months ago
- Open Breach and Attack Simulation Platform☆810Updated this week
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆490Updated 3 months ago
- Ransomware simulator written in Golang☆417Updated 2 years ago
- NERVE Continuous Vulnerability Scanner☆455Updated last year
- Automatically created C2 Feeds☆565Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,027Updated this week