sreinhardt / Docker-HoneynetLinks
Docker configs and build scripts.
☆22Updated 10 years ago
Alternatives and similar repositories for Docker-Honeynet
Users that are interested in Docker-Honeynet are comparing it to the libraries listed below
Sorting:
- YAPDNS☆39Updated 10 years ago
- Repository for Security Workshop content☆20Updated 8 years ago
- ☆39Updated 7 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- ESPot - ElasticSearch Honeypot☆27Updated 11 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 11 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- A honeypot proxy for mongodb. When run, this will proxy and log all traffic to a dummy mongodb server.☆92Updated 2 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 6 years ago
- ☆78Updated 10 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆14Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Spam trap management☆23Updated last year
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆78Updated last year
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Fun with Amazon AWS and Maltego☆30Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago