referefref / honeydetLinks
Signature based honeypot detector tool written in Golang
☆107Updated 9 months ago
Alternatives and similar repositories for honeydet
Users that are interested in honeydet are comparing it to the libraries listed below
Sorting:
- HASH (HTTP Agnostic Software Honeypot)☆140Updated last year
- ☆56Updated 11 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated 2 months ago
- Create honeypots for cloud environments☆107Updated 2 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆72Updated last week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last week
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆185Updated 2 weeks ago
- God Mode Detection Rules☆134Updated last year
- Extracting IoC data from eMail☆139Updated 4 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆107Updated last week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated last month
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- FT3: Fraud Tools, Tactics, and Techniques Framework☆94Updated 4 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 9 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆81Updated 4 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆54Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆156Updated 7 months ago
- ShellSweeping the evil.☆181Updated last year
- Data visualization for blue teams☆127Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated last month
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- ☆52Updated 4 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- C2 Active Scanner☆60Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago