tbiens / icarusLinks
SMTP&SNMP&SMB honeypot
☆61Updated 3 months ago
Alternatives and similar repositories for icarus
Users that are interested in icarus are comparing it to the libraries listed below
Sorting:
- Python wrapper for urlscan.io's API☆105Updated 4 years ago
- Python Scanner for passing IP addresses and utilizing AbuseIPdb API to find bad IPs☆60Updated last month
- Sample programs to access the API☆103Updated 2 months ago
- A self hosted yopmail like server running in a docker☆66Updated last year
- The central repository for adding or removing domains, links, and IPs from the Phishing.Database project.☆79Updated this week
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆112Updated this week
- Script for running bulk checks via https://www.abuseipdb.com/. Available in Powershell with WinForms GUI, Python with Tkinter GUI and BAS…☆144Updated 2 years ago
- Blackbook of malware domains☆266Updated 8 months ago
- A basic SSH honeypot built in Python and containerised in Docker☆20Updated 4 years ago
- FTP Honeypot☆33Updated 2 years ago
- Standard-Format Threat Intelligence Feeds☆127Updated this week
- packet captures of real-world ddos attacks☆167Updated 4 months ago
- The simplest way to find how to report abusive domains☆53Updated 2 years ago
- HoneyHTTPD is a Python-based web server honeypot/service imitation builder. Great for honeypots or faking HTTP services.☆53Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- Hourly checked and updated list of IP Addresses of Tor and Tor Exit Nodes☆359Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆211Updated 2 years ago
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆75Updated last year
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 3 years ago
- ☆78Updated 4 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Updated last year
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Updated last year
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆162Updated last year
- IOCs published by Black Lotus Labs☆125Updated 3 months ago
- Simple DNS logging server☆19Updated 4 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- Docker container for the gophish phishing framework.☆52Updated last month
- 🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯☆74Updated 4 months ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated last year