tbiens / icarusLinks
SMTP&SNMP&SMB honeypot
☆59Updated 3 weeks ago
Alternatives and similar repositories for icarus
Users that are interested in icarus are comparing it to the libraries listed below
Sorting:
- Hourly checked and updated list of IP Addresses of Tor and Tor Exit Nodes☆357Updated last year
- The central repository for adding or removing domains, links, and IPs from the Phishing.Database project.☆72Updated this week
- packet captures of real-world ddos attacks☆167Updated 3 weeks ago
- Standard-Format Threat Intelligence Feeds☆124Updated this week
- Python Scanner for passing IP addresses and utilizing AbuseIPdb API to find bad IPs☆60Updated 3 weeks ago
- The simplest way to find how to report abusive domains☆54Updated 2 years ago
- Blackbook of malware domains☆261Updated 4 months ago
- Python wrapper for urlscan.io's API☆105Updated 4 years ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆109Updated this week
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆74Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆160Updated last year
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆187Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆127Updated 2 years ago
- 🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯☆70Updated last month
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆178Updated 3 years ago
- AbuseIpDB - Wrapper around the AbuseIPDb service API☆16Updated last year
- IOCs published by Black Lotus Labs☆124Updated last week
- Script for running bulk checks via https://www.abuseipdb.com/. Available in Powershell with WinForms GUI, Python with Tkinter GUI and BAS…☆142Updated last year
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆149Updated 3 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆201Updated 2 years ago
- A phishing kit collector for scavengers☆219Updated 2 weeks ago
- Sample programs to access the API☆93Updated 6 months ago
- Ransomware leak site monitoring☆316Updated 3 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- CSI SIEM☆110Updated 2 years ago
- A basic flask based Outlook Web Honey pot☆67Updated 2 years ago
- Suricata rules for network anomaly detection☆175Updated 2 weeks ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆129Updated last week