yvesago / imap-honeyLinks
IMAP or SMTP honeypot written in Golang
☆25Updated 3 years ago
Alternatives and similar repositories for imap-honey
Users that are interested in imap-honey are comparing it to the libraries listed below
Sorting:
- SMTP honeypot written in Golang☆31Updated 9 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- Graphoscope is a solution to access multiple independent data sources from a common UI and show data relations as a graph☆40Updated 2 weeks ago
- Low-interaction VNC honeypot with a static challenge.☆22Updated 6 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- OwlH Master API☆24Updated 5 months ago
- D4 core software (server and sample sensor client)☆42Updated last year
- A Golang API for TheHive☆13Updated 5 years ago
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆31Updated 6 years ago
- A low/zero interaction ssh authentication logging honeypot☆23Updated this week
- Network Entity Reputation Database☆37Updated last month
- A Passive SSH back-end and scanner.☆104Updated 3 months ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆106Updated last year
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Updated 2 years ago
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆103Updated this week
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆56Updated last week
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated 8 months ago
- server for indexing and querying passive DNS observations☆47Updated 3 months ago
- Find abuse contacts for observables☆70Updated 2 years ago
- Collect autorun records from running system☆60Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Updated 2 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 7 months ago
- Please use https://github.com/veeral-patel/true-positive instead☆69Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 7 years ago