tnich / honssh
HonSSH is designed to log all SSH communications between a client and server.
☆374Updated 3 years ago
Alternatives and similar repositories for honssh:
Users that are interested in honssh are comparing it to the libraries listed below
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- A low to medium interaction honeypot.☆465Updated 11 months ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆416Updated 2 years ago
- Malicious HTTP traffic explorer☆716Updated last year
- A Simple Elasticsearch Honeypot☆187Updated 9 years ago
- An SMTP Honeypot☆263Updated last year
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- CERT Tapioca for MITM network analysis☆182Updated 9 months ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆504Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- A Distributed, Search-Optimized Full Packet Capture System☆241Updated last year
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 4 years ago
- Malcom - Malware Communications Analyzer☆1,157Updated 7 years ago
- The Shadow Daemon web application firewall server☆298Updated 2 years ago
- Tools for auditing WAFS☆457Updated 4 years ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆491Updated 3 months ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆626Updated 8 months ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆539Updated 11 months ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆155Updated 9 years ago
- Haka runtime☆449Updated 7 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Updated 8 years ago
- Incident Response Forensic Framework☆599Updated 5 years ago
- A UNIX security auditing tool based on several security frameworks☆313Updated 7 months ago
- Protect your Wireless Network from Evil Access Points!☆181Updated last year
- A webshell framework for penetration testers.☆297Updated 10 months ago
- Visualize statistics from a Kippo SSH honeypot☆134Updated last year
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 3 years ago