qeeqbox / honeypots
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)
☆749Updated 3 weeks ago
Alternatives and similar repositories for honeypots:
Users that are interested in honeypots are comparing it to the libraries listed below
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆674Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆183Updated last year
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆886Updated last week
- Digital Forensics Investigation Platform☆799Updated 4 months ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆178Updated 2 years ago
- AIL framework - Analysis Information Leak framework☆685Updated this week
- OWASP Honeypot, Automated Deception Framework.☆452Updated 5 months ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆280Updated 10 months ago
- Your Everyday Threat Intelligence☆1,809Updated this week
- A query aggregator for OSINT based threat hunting☆878Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,046Updated last month
- Extract and aggregate threat intelligence.☆846Updated last year
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆757Updated 7 months ago
- Online hash checker for Virustotal and other services☆821Updated 9 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,298Updated 3 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆700Updated 2 weeks ago
- Home of the dionaea honeypot☆732Updated 6 months ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆869Updated this week
- Live Feed of C2 servers, tools, and botnets☆579Updated this week
- Digging Deeper....☆3,109Updated this week
- SIEM Tactics, Techiques, and Procedures☆612Updated last week
- Sophos-originated indicators-of-compromise from published reports☆565Updated 2 weeks ago
- ThePhish: an automated phishing email analysis tool☆1,192Updated 6 months ago
- Yet another Ransomware gang tracker☆376Updated this week
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆507Updated 4 months ago
- YARA signature and IOC database for my scanners and tools☆2,554Updated last week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆640Updated 3 months ago
- CLI tool for open source and threat intelligence☆1,193Updated 2 months ago
- Indicators of Compromises (IOC) of our various investigations☆1,728Updated this week
- Automatically created C2 Feeds☆584Updated this week