schmalle / medpot
HL7 / FHIR honeypot
☆25Updated 11 months ago
Alternatives and similar repositories for medpot:
Users that are interested in medpot are comparing it to the libraries listed below
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Updated 6 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- HoneySAP: SAP Low-interaction research honeypot☆50Updated 2 years ago
- Amun Honeypot☆61Updated 11 months ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 10 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated last month
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- ☆35Updated last year
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Suricata rules for Emerging Threats and funkyness☆74Updated 7 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Dionaea Front Web☆66Updated 7 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆48Updated 4 years ago
- An extensible honeypot framework☆93Updated 2 years ago