referefref / honeydetLinks
Signature based honeypot detector tool written in Golang
☆103Updated 5 months ago
Alternatives and similar repositories for honeydet
Users that are interested in honeydet are comparing it to the libraries listed below
Sorting:
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 8 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated last week
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated last year
- Analyze pcaps with Zeek and a Grafana Dashboard☆182Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 11 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- ShellSweeping the evil.☆179Updated 9 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 6 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆50Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆127Updated 4 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆53Updated this week
- FT3: Fraud Tools, Tactics, and Techniques Framework☆90Updated last month
- JA4TScan is an active TCP server fingerprinting tool.☆88Updated last year
- God Mode Detection Rules☆134Updated last year
- Shodan Monitoring integration for TheHive.☆131Updated 9 months ago
- Repository of tools and resources for analyzing Docker containers☆68Updated last year
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆105Updated this week
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆77Updated last month
- Building a consolidated RSS feed for articles about cyberattacks☆71Updated this week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆53Updated 2 months ago
- Tor onion address lookup☆54Updated 3 weeks ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- NTP Exfiltration Tool☆145Updated last year
- PowerShell Script Analyzer☆70Updated last year