yvesago / imap-honey
IMAP or SMTP honeypot written in Golang
☆25Updated 2 years ago
Alternatives and similar repositories for imap-honey:
Users that are interested in imap-honey are comparing it to the libraries listed below
- SMTP honeypot written in Golang☆29Updated 8 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆9Updated 2 years ago
- Network Entity Reputation Database☆34Updated 2 months ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated 9 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A Golang API for TheHive☆13Updated 4 years ago
- automate your MISP installs☆67Updated 4 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- OwlH Master API☆24Updated 11 months ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆50Updated this week
- OwlH Master API Web User Interface☆12Updated 11 months ago
- ☆34Updated 4 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- ioc2rpz is a place where threat intelligence meets DNS.☆109Updated 2 months ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Website crawler with YARA detection☆88Updated last year
- ☆12Updated 5 years ago
- ☆15Updated 2 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆108Updated 7 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 8 months ago
- Yet another way to find where to report an abuse☆32Updated 2 months ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated 10 months ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Data related to the SANS Internet Storm Center☆10Updated 6 years ago
- Your Everyday Threat Intelligence☆22Updated 8 years ago