Simple High Interaction Honeypot Solution for SMB protocol
☆50Mar 28, 2021Updated 4 years ago
Alternatives and similar repositories for HoneySMB
Users that are interested in HoneySMB are comparing it to the libraries listed below
Sorting:
- MICROS Honeypot is a low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality …☆17Sep 25, 2018Updated 7 years ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- Low-interaction Postgres Honeypot☆20May 20, 2024Updated last year
- ☆13May 27, 2020Updated 5 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- A simple ssh honeypot in golang☆37Apr 7, 2015Updated 10 years ago
- Home of the dionaea honeypot☆791Aug 1, 2024Updated last year
- ☆21Mar 24, 2017Updated 8 years ago
- Generic Low Interaction Honeypot☆298Dec 31, 2025Updated 2 months ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Multi-head SSH honeypot system.☆24Mar 21, 2024Updated 2 years ago
- ☆24Aug 25, 2015Updated 10 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- Webapplication Honeypot☆15May 12, 2013Updated 12 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Honeypot that emulates several protocols (incl. SSH, telnet, SMTP, HTTP, SSL and SIP)☆52Feb 19, 2016Updated 10 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- A credential dumping SSH honeypot with statistics☆14Oct 18, 2019Updated 6 years ago
- This is a framework written in EnScript to utilize the network capabilities of EnCase. The purpose is to allow for someone to build a qui…☆13Apr 22, 2015Updated 10 years ago
- ☆13Feb 5, 2022Updated 4 years ago
- Extract useful information from a Twitter account.☆35Jan 1, 2014Updated 12 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 8 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- Java bytecode virus proof of concept (jarfile self-replication)☆17Jun 9, 2023Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Nov 24, 2014Updated 11 years ago
- A tool for deobfuscation of JVM bytecode by analyzing similarities in call-graphs and other program features☆14Nov 14, 2012Updated 13 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 3 years ago