zeroq / amun
Amun Honeypot
☆60Updated 10 months ago
Alternatives and similar repositories for amun:
Users that are interested in amun are comparing it to the libraries listed below
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Updated 2 years ago
- Passive DNS V2☆61Updated 11 years ago
- A simple and effective phpmyadmin honeypot☆65Updated 7 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Updated 5 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- Cyber Intel Management☆48Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆59Updated 3 months ago
- NTP logger/honeypot☆53Updated 11 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- ☆22Updated 7 years ago
- HoneySAP: SAP Low-interaction research honeypot☆49Updated last year
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 4 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago