qeeqbox / honeypotsLinks
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)
☆844Updated 9 months ago
Alternatives and similar repositories for honeypots
Users that are interested in honeypots are comparing it to the libraries listed below
Sorting:
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆708Updated 2 years ago
- AIL framework - Analysis Information Leak framework☆814Updated this week
- A website and framework for testing NIDS detection☆294Updated 3 months ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆201Updated 2 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆912Updated 4 months ago
- ThePhish: an automated phishing email analysis tool☆1,287Updated last year
- A query aggregator for OSINT based threat hunting☆915Updated 3 weeks ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆1,051Updated last week
- Live Feed of C2 servers, tools, and botnets☆717Updated last week
- This project is a SIEM with SIRP and Threat Intel, all in one.☆463Updated 11 months ago
- Yet another Ransomware gang tracker☆514Updated last week
- Collaborative Incident Response platform☆1,306Updated this week
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆561Updated 2 months ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,070Updated 4 months ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆602Updated last week
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆840Updated this week
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆187Updated 3 years ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,164Updated this week
- Extract and aggregate threat intelligence.☆883Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,261Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆439Updated this week
- OpenCTI Connectors☆483Updated last week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆737Updated last week
- Automatically created C2 Feeds☆652Updated this week
- OWASP Honeypot, Automated Deception Framework.☆469Updated last year
- SIEM Tactics, Techiques, and Procedures☆676Updated last month
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆641Updated 3 months ago
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆598Updated last year
- Awesome Security lists for SOC/CERT/CTI☆1,165Updated this week
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,388Updated last year