rep / dionaeaLinks
dionaea low interaction honeypot (forked from dionaea.carnivore.it)
☆152Updated 10 years ago
Alternatives and similar repositories for dionaea
Users that are interested in dionaea are comparing it to the libraries listed below
Sorting:
- Honeypot deployment made easy☆237Updated 6 years ago
- Open Source Telnet Honeypot☆105Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Updated 10 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Updated 2 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Updated 8 years ago
- ☆307Updated 8 years ago
- Various Bro scripts☆96Updated 9 years ago
- ☆75Updated 3 years ago
- a Malware/Threat Analyst Desktop☆89Updated 10 years ago
- Auto Installer Script for Cuckoo Sandbox☆164Updated 7 years ago
- The Seeker of IOC☆131Updated 5 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- Kvasir: Penetration Test Data Management☆430Updated 6 years ago
- Fancy Bear Source Code☆262Updated 8 years ago
- Malware Repository Framework☆99Updated 7 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆139Updated 8 months ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 8 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 10 years ago
- Next Generation Firewall Audit and Bypass Tool☆267Updated 8 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- A python script used to parse the SAM registry hive.☆74Updated 7 years ago
- Differential Analysis of Malware in Memory☆214Updated 8 years ago
- Malware Control Monitor☆88Updated 10 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 9 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆127Updated 10 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Updated 8 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- Query and report user logons relations from MS Windows Security Events☆242Updated 7 years ago
- Bro scripts written by CrowdStrike Services☆148Updated 4 years ago
- Extract files from network traffic with Zeek.☆103Updated 5 years ago