All Projects → SSHapendoes → Similar Projects or Alternatives

275 Open source projects that are alternatives of or similar to SSHapendoes

Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+590.32%)
malware-persistence
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+251.61%)
Misp Galaxy
Clusters and elements to attach to MISP events or attributes (like threat actors)
Stars: ✭ 276 (+790.32%)
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+187.1%)
Threatbus
🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (+348.39%)
Mihari
A helper to run OSINT queries & manage results continuously
Stars: ✭ 239 (+670.97%)
IronNetTR
Threat research and reporting from IronNet's Threat Research Teams
Stars: ✭ 36 (+16.13%)
OSINT-Brazuca
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (+1538.71%)
Signature Base
Signature base for my scanner tools
Stars: ✭ 1,212 (+3809.68%)
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (+261.29%)
Threatingestor
Extract and aggregate threat intelligence.
Stars: ✭ 439 (+1316.13%)
Sweetie Data
This repo contains logstash of various honeypots
Stars: ✭ 163 (+425.81%)
Mutual labels:  honeypot, threat-intelligence
Dovehawk
Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings
Stars: ✭ 97 (+212.9%)
Patrowlengines
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (+422.58%)
Mthc
All-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (+332.26%)
Scrummage
The Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (+1045.16%)
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (+125.81%)
Dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+9977.42%)
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+11141.94%)
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-32.26%)
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (+122.58%)
Patrowldocs
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (+238.71%)
Teler
Real-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+3925.81%)
Threat Hunting
Personal compilation of APT malware from whitepaper releases, documents and own research
Stars: ✭ 219 (+606.45%)
Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+625.81%)
Ioc Explorer
Explore Indicators of Compromise Automatically
Stars: ✭ 73 (+135.48%)
Fatt
FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
Stars: ✭ 490 (+1480.65%)
Mutual labels:  honeypot, threat-hunting
Klara
Kaspersky's GReAT KLara
Stars: ✭ 565 (+1722.58%)
mail to misp
Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: ✭ 61 (+96.77%)
Sysmontools
Utilities for Sysmon
Stars: ✭ 903 (+2812.9%)
Phishingkithunter
Find phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (+470.97%)
Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+1070.97%)
Opensquat
Detection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (+380.65%)
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-6.45%)
sqhunter
A simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (+106.45%)
MindMaps
#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+622.58%)
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-29.03%)
Azure-Sentinel-4-SecOps
Microsoft Sentinel SOC Operations
Stars: ✭ 140 (+351.61%)
Stalkphish
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+725.81%)
pybinaryedge
Python 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/
Stars: ✭ 16 (-48.39%)
Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (+945.16%)
Intelowl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+6719.35%)
Threat Intel
Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).
Stars: ✭ 252 (+712.9%)
ThreatIntelligence
Tracking APT IOCs
Stars: ✭ 23 (-25.81%)
Judge-Jury-and-Executable
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+112.9%)
Mutual labels:  threat-hunting
DemonHunter
Distributed Honeypot
Stars: ✭ 54 (+74.19%)
Mutual labels:  honeypot
Public-Intelligence-Feeds
Standard-Format Threat Intelligence Feeds
Stars: ✭ 60 (+93.55%)
Mutual labels:  threat-intelligence
gitops-helm-workshop
Progressive Delivery for Kubernetes with Flux, Helm, Linkerd and Flagger
Stars: ✭ 59 (+90.32%)
Mutual labels:  canary
transparency
Read-only mirror of https://owo.codes/whats-this/transparency
Stars: ✭ 13 (-58.06%)
Mutual labels:  canary
Honeypots-on-Blockchain
This repo collects almost all the smart contract honeypots that you could find in the first three pages of Google search.
Stars: ✭ 95 (+206.45%)
Mutual labels:  honeypots
Ehoney
安全、快捷、高交互、企业级的蜜罐管理系统,护网;支持多种协议蜜罐、蜜签、诱饵等功能。A safe, fast, highly interactive and enterprise level honeypot management system, supports multiple protocol honeypots, honeytokens, baits and other functions.
Stars: ✭ 1,051 (+3290.32%)
Mutual labels:  honeypot
fakessh
A dockerized fake SSH server honeypot written in Go that logs login attempts.
Stars: ✭ 42 (+35.48%)
Mutual labels:  honeypot
CCXDigger
The CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (+45.16%)
Mutual labels:  threat-intelligence
Trapdoor
Serverless honeytoken 🕵🏻‍♂️
Stars: ✭ 70 (+125.81%)
Mutual labels:  honeypot
kong-plugins-canary
The grayscale plug-in based on gateway Kong, called Canary, meets A/B testing and dynamically switches upstream agents
Stars: ✭ 31 (+0%)
Mutual labels:  canary
SysmonResources
Consolidation of various resources related to Microsoft Sysmon & sample data/log
Stars: ✭ 64 (+106.45%)
Mutual labels:  threat-hunting
honeycomb
An extensible honeypot framework
Stars: ✭ 93 (+200%)
Mutual labels:  honeypot
evtx-hunter
evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
Stars: ✭ 122 (+293.55%)
Mutual labels:  threat-hunting
weblogic honeypot
WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
Stars: ✭ 30 (-3.23%)
Mutual labels:  honeypot
K8s Deployment Strategies
Kubernetes deployment strategies explained
Stars: ✭ 2,649 (+8445.16%)
Mutual labels:  canary
1-60 of 275 similar projects