telekom-security / ewsposterLinks
collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.
☆15Updated 5 months ago
Alternatives and similar repositories for ewsposter
Users that are interested in ewsposter are comparing it to the libraries listed below
Sorting:
- Watchtower, monitoring your Slack workspaces.☆16Updated 5 years ago
- ☆33Updated this week
- 🤖 Daily updated translation maps for T-Pot☆22Updated last year
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- IntelOwl's Web Interface. Built with Angular 10.☆86Updated 3 years ago
- SMTP honeypot written in Golang☆33Updated 9 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆96Updated last month
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆77Updated last month
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Updated 4 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆56Updated this week
- Incident Response Network Tools☆24Updated 4 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Updated last week
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Updated 2 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16Updated 8 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 3 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Updated 2 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 2 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated last year
- Cyber Threat Intelligence Feeds☆70Updated last year
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 4 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated last year
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆29Updated last year
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Updated 9 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago