qeeqbox / honeypots
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)
☆695Updated last month
Related projects ⓘ
Alternatives and complementary repositories for honeypots
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆661Updated last year
- A query aggregator for OSINT based threat hunting☆864Updated last week
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆730Updated 4 months ago
- AIL framework - Analysis Information Leak framework☆609Updated this week
- A Holistic OSINT and Threat Hunting Platform☆512Updated last year
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆169Updated 2 years ago
- A browser extension for OSINT search☆1,480Updated this week
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆162Updated last year
- OSINT tool - gets data from services like shodan, censys etc. in one app☆637Updated last year
- Digital Forensics Investigation Platform☆769Updated last month
- Yet another Ransomware gang tracker☆329Updated this week
- ThePhish: an automated phishing email analysis tool☆1,157Updated 3 months ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆865Updated 2 weeks ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆926Updated this week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆597Updated 3 weeks ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆272Updated 7 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,256Updated 2 weeks ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆560Updated last year
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,262Updated 7 months ago
- Automatically created C2 Feeds☆531Updated this week
- OSINT Tools for the Dark Web☆757Updated 5 months ago
- Live Feed of C2 servers, tools, and botnets☆541Updated this week
- Extract and aggregate threat intelligence.☆831Updated 9 months ago
- An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻☆1,435Updated 2 years ago
- OSINT Template Engine☆526Updated last year
- OWASP Honeypot, Automated Deception Framework.☆434Updated 2 months ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆493Updated this week
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,546Updated 5 months ago
- Your Everyday Threat Intelligence☆1,751Updated this week
- CLI tool for open source and threat intelligence☆1,175Updated 11 months ago