ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)
☆47Apr 26, 2021Updated 4 years ago
Alternatives and similar repositories for seahorse
Users that are interested in seahorse are comparing it to the libraries listed below
Sorting:
- Custom security distro for remote penetration testing☆55Mar 26, 2021Updated 4 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆33Apr 15, 2022Updated 3 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆194Oct 30, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆106Jul 11, 2021Updated 4 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆310Apr 15, 2024Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆224Aug 8, 2023Updated 2 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆825Aug 8, 2023Updated 2 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆950Dec 3, 2025Updated 3 months ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- ☆69May 3, 2021Updated 4 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- Matos is an open-source cloud security tool for analyzing multi-cloud infrastructure security.☆17Feb 16, 2023Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- A sample POC for CVE-2021-30657 affecting MacOS☆30Nov 8, 2021Updated 4 years ago
- VBA Macro obfuscator☆13Sep 20, 2020Updated 5 years ago
- Maltego transform for OpenDNS Investigate API☆12Jan 6, 2015Updated 11 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- SpyStroke is an advanced and lightweight keylogger designed for ethical hacking and cybersecurity research. It captures keystrokes silent…☆14Jul 28, 2025Updated 7 months ago
- ☆10May 15, 2020Updated 5 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Framework for Telegram users and chats investigating☆74Jun 5, 2025Updated 9 months ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- Convert Wigle.net result from json to Kml