referefref / honeydetLinks
Signature based honeypot detector tool written in Golang
☆95Updated 2 months ago
Alternatives and similar repositories for honeydet
Users that are interested in honeydet are comparing it to the libraries listed below
Sorting:
- ☆141Updated 2 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Shodan Monitoring integration for TheHive.☆130Updated 5 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆81Updated last week
- LOKI2 - Simple IOC and YARA Scanner☆93Updated 10 months ago
- Canary Detection☆168Updated 2 weeks ago
- All kinds of tiny shells☆58Updated 2 years ago
- God Mode Detection Rules☆134Updated 9 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆75Updated 2 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆195Updated 4 months ago
- ☆99Updated last month
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆170Updated this week
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆74Updated last month
- ☆25Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 4 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 8 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 7 months ago
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated 2 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- ShellSweeping the evil.☆167Updated 6 months ago
- Knowledge base on cybercriminal concealment techniques☆68Updated 3 weeks ago