rubenespadas / DionaeaFRLinks
Dionaea Front Web
☆67Updated 7 years ago
Alternatives and similar repositories for DionaeaFR
Users that are interested in DionaeaFR are comparing it to the libraries listed below
Sorting:
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Modern Honey Network App for Splunk☆51Updated 5 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Passive DNS V2☆60Updated 11 years ago
- Censys.io Python API Search☆42Updated 8 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- Honeypot repo☆48Updated 9 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆79Updated 6 years ago
- ☆22Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆81Updated 9 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- A simple and effective phpmyadmin honeypot☆67Updated 7 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- A warehouse for your malware☆134Updated 12 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Updated 5 years ago