tklengyel / honeybridView external linksLinks
Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TCP or UDP) from one primary destination host to a secondary destination host.
☆31Jan 8, 2019Updated 7 years ago
Alternatives and similar repositories for honeybrid
Users that are interested in honeybrid are comparing it to the libraries listed below
Sorting:
- OpenFlow Honeypot☆24Jan 5, 2013Updated 13 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- Python bindings to libhtp☆31Oct 13, 2020Updated 5 years ago
- Passive Network Audit Framework☆32May 17, 2018Updated 7 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Sep 1, 2015Updated 10 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 9 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- ☆32Jun 19, 2024Updated last year
- A taster of TTWE☆18Sep 1, 2014Updated 11 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- ☆17Oct 5, 2014Updated 11 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- ☆36Dec 7, 2020Updated 5 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Feb 17, 2016Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 10 years ago
- Development moved to https://github.com/mhsys/mh☆14Feb 20, 2018Updated 7 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago