tbiens / icarusLinks
SMTP&SNMP&SMB honeypot
☆59Updated last month
Alternatives and similar repositories for icarus
Users that are interested in icarus are comparing it to the libraries listed below
Sorting:
- Hourly checked and updated list of IP Addresses of Tor and Tor Exit Nodes☆359Updated last year
- Python Scanner for passing IP addresses and utilizing AbuseIPdb API to find bad IPs☆60Updated last week
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 2 years ago
- Python wrapper for urlscan.io's API☆105Updated 4 years ago
- A self hosted yopmail like server running in a docker☆65Updated last year
- The central repository for adding or removing domains, links, and IPs from the Phishing.Database project.☆75Updated this week
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆75Updated last year
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Sample programs to access the API☆95Updated last week
- CSI SIEM☆110Updated 3 years ago
- The simplest way to find how to report abusive domains☆53Updated 2 years ago
- Standard-Format Threat Intelligence Feeds☆126Updated this week
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆161Updated last year
- Script for running bulk checks via https://www.abuseipdb.com/. Available in Powershell with WinForms GUI, Python with Tkinter GUI and BAS…☆142Updated 2 years ago
- Blackbook of malware domains☆262Updated 6 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆110Updated this week
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆190Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 10 months ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Updated last year
- Nmap Web Interface including XML parsing, maps and reports☆55Updated 4 years ago
- IOCs published by Black Lotus Labs☆124Updated last month
- HoneyHTTPD is a Python-based web server honeypot/service imitation builder. Great for honeypots or faking HTTP services.☆53Updated last year
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆149Updated 3 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆52Updated last year
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆182Updated last year
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆87Updated 2 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆132Updated last week
- A CLI tool to check ✔️, report 🚩 IP addresses, download blacklist 🚫 with AbuseIPDB API v2☆51Updated 2 years ago