zeroq / amunLinks
Amun Honeypot
☆62Updated last year
Alternatives and similar repositories for amun
Users that are interested in amun are comparing it to the libraries listed below
Sorting:
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- Passive DNS V2☆60Updated 11 years ago
- A simple and effective phpmyadmin honeypot☆67Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- An ICAP Server with yara scanner for URL and content.☆59Updated 6 months ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆56Updated 3 years ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- Network sinkhole for isolated malware analysis☆40Updated 7 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- REST API based malware repository (abandoned)☆107Updated 10 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 10 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- An extensible honeypot framework☆93Updated 3 years ago
- HL7 / FHIR honeypot☆25Updated last year
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- HoneySAP: SAP Low-interaction research honeypot☆50Updated 2 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆80Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆81Updated 9 years ago
- Low-interaction Postgres Honeypot☆19Updated last year