torque59 / nosqlpotLinks
The NoSQL Honeypot Framework
☆102Updated last year
Alternatives and similar repositories for nosqlpot
Users that are interested in nosqlpot are comparing it to the libraries listed below
Sorting:
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Subdomain Analyzer☆77Updated 8 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- observation camera honeypot☆50Updated 10 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆56Updated 3 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- A python script used to parse the SAM registry hive.☆74Updated 7 years ago
- Honeynet Project generic authenticated datafeed protocol☆216Updated last year
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Updated 8 years ago
- Honeypot deployment made easy☆237Updated 6 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- YAPDNS☆39Updated 10 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- A Framework for managing Cyber Threat Intelligence.☆5Updated 7 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Updated 8 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆124Updated 9 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- ☆44Updated 7 years ago
- Malware Control Monitor☆87Updated 10 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago