sookyp / honeyd-pythonLinks
☆18Updated 8 years ago
Alternatives and similar repositories for honeyd-python
Users that are interested in honeyd-python are comparing it to the libraries listed below
Sorting:
- Generic Low Interaction Honeypot☆279Updated 3 weeks ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆175Updated 4 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆148Updated 11 years ago
- Super Next generation Advanced Reactive honEypot☆464Updated last year
- Various Bro scripts☆96Updated 8 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- Bro IDS Dockerfile☆129Updated 5 years ago
- An SMTP Honeypot☆264Updated 2 months ago
- Bro scripts written by CrowdStrike Services☆146Updated 4 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆138Updated 2 months ago
- DGA Domains detection☆66Updated 7 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- Bro scripts to be shared with the community☆109Updated 12 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆152Updated last week
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Cyber Threat Intelligence Feeds☆96Updated 8 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Docker files for building Zeek.☆86Updated last year
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Threat Feed Aggregation, Made Easy☆168Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Suricata Extreme Performance Tuning guide☆209Updated 7 years ago
- Open Source Telnet Honeypot☆104Updated 8 years ago
- A modular Python application to pull intelligence about malicious files☆122Updated 4 years ago