referefref / honeydetLinks
Signature based honeypot detector tool written in Golang
☆106Updated 7 months ago
Alternatives and similar repositories for honeydet
Users that are interested in honeydet are comparing it to the libraries listed below
Sorting:
- HASH (HTTP Agnostic Software Honeypot)☆140Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆53Updated 3 weeks ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆92Updated 3 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated 3 weeks ago
- ☆55Updated 9 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 7 months ago
- Create honeypots for cloud environments☆104Updated last month
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- God Mode Detection Rules☆134Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- Extracting IoC data from eMail☆138Updated 3 months ago
- Canary Detection☆188Updated 3 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- ShellSweeping the evil.☆181Updated 11 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆109Updated this week
- Data visualization for blue teams☆126Updated 2 years ago
- A go-exploit to scan for implanted Cisco IOS XE Systems☆41Updated last year
- Building a consolidated RSS feed for articles about cyberattacks☆72Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 11 months ago
- Tail Certificate Transparency logs and extract hostnames☆124Updated 4 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆53Updated last year
- Knowledge base on cybercriminal concealment techniques☆80Updated 6 months ago
- Data from Dark Web Marketplace scraping - Be careful☆42Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Tor onion address lookup☆55Updated 2 months ago