collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.
☆16Aug 15, 2025Updated 7 months ago
Alternatives and similar repositories for ewsposter
Users that are interested in ewsposter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Watchtower, monitoring your Slack workspaces.☆16Jan 26, 2021Updated 5 years ago
- DICOM Honeypot☆27Dec 5, 2025Updated 3 months ago
- HoneySAP: SAP Low-interaction research honeypot☆50May 1, 2023Updated 2 years ago
- ☆34Updated this week
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago
- endlessh auto reporting IPs to abuseipdb.com☆16Jan 15, 2025Updated last year
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆53Dec 17, 2025Updated 3 months ago
- SMTP honeypot written in Golang☆33Aug 9, 2016Updated 9 years ago
- Fail2ban exporter for prometheus.io☆13Mar 27, 2022Updated 3 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- Network Honeypot written in Rust☆15Mar 11, 2026Updated last week
- Generic Low Interaction Honeypot☆298Dec 31, 2025Updated 2 months ago
- Run a list of functions in order in a given object context. The functions can be callback-taking or promise-returning.☆14Oct 25, 2025Updated 4 months ago
- Low-Impact Fingerprint Tool☆59Sep 25, 2025Updated 5 months ago
- Cowrie Honeypot Obscurer☆18Oct 14, 2020Updated 5 years ago
- Human and machine readable web vulnerability testing format☆195Sep 19, 2022Updated 3 years ago
- CoreFollowUp phishing attack on macOS☆15Mar 15, 2022Updated 4 years ago
- Image/video processing proxy with static asset caching☆12Nov 7, 2023Updated 2 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last month
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Easily generate a list of offsets for use in SVM programs☆17Mar 6, 2026Updated 2 weeks ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- ☆12Feb 16, 2024Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- a low-interaction honeypot☆95Jun 4, 2017Updated 8 years ago
- A small script and nginx configuration to increase the privacy of piwigo gallery☆19Dec 22, 2021Updated 4 years ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- Logs incoming attempts to connect to NetBIOS/SMB☆14May 15, 2017Updated 8 years ago
- 🧮 U128 helpers for Solana programs.☆11Sep 5, 2023Updated 2 years ago
- ☆16Apr 4, 2016Updated 9 years ago
- This project injects into Hopper Disassembler and exposes core functionality via a local server. It can be used to create automations/too…☆16Apr 17, 2021Updated 4 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Aug 31, 2018Updated 7 years ago
- Forward application metrics and events to Datadog☆12Dec 4, 2022Updated 3 years ago
- a tiny module for piping an input to multiple output streams☆17Oct 25, 2025Updated 4 months ago
- A Modified Validator for the Diet Client☆11Jun 14, 2024Updated last year
- Telekom Security Compliance Framework☆10Feb 5, 2019Updated 7 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 8 months ago
- Log4j honeypot to capture payloads within HTTP headers, query parameters and POST requests.☆14Dec 15, 2021Updated 4 years ago