yvesago / imap-honeyLinks
IMAP or SMTP honeypot written in Golang
☆26Updated 3 years ago
Alternatives and similar repositories for imap-honey
Users that are interested in imap-honey are comparing it to the libraries listed below
Sorting:
- SMTP honeypot written in Golang☆32Updated 9 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- A low/zero interaction ssh authentication logging honeypot☆25Updated 2 months ago
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆108Updated last week
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆31Updated 6 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Find abuse contacts for observables☆70Updated 3 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Updated 6 years ago
- OwlH Master API☆24Updated 8 months ago
- Golang-based subdomain miner leveraging certificate transparency logs☆74Updated 2 years ago
- A Golang API for TheHive☆13Updated 5 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Updated 2 years ago
- Network Entity Reputation Database☆37Updated 2 months ago
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated 11 months ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Updated 5 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Updated 5 years ago
- Automated handling of data feeds for security teams☆146Updated last week
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated last year
- Collect autorun records from running system☆59Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 10 months ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108Updated last year
- Simple SYSLOG client in Go☆22Updated 7 months ago
- A Python DNS crawler to find identical domain names under different TLDs.☆25Updated 6 years ago
- simple YARA-based IOC scanner☆173Updated last month
- Core elements of the Modern Honey Network implemented in Docker☆35Updated 3 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆96Updated last month