AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+1513.33%)
RouterosRouterOS Security Research Tooling and Proof of Concepts
Stars: ✭ 603 (+1240%)
PyrdpRDP man-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
Stars: ✭ 567 (+1160%)
Opencanary webThe web management platform of honeypot
Stars: ✭ 547 (+1115.56%)
DionaeaHome of the dionaea honeypot
Stars: ✭ 490 (+988.89%)
FattFATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
Stars: ✭ 490 (+988.89%)
Honeylambdahoneyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
Stars: ✭ 454 (+908.89%)
HoneypyA low to medium interaction honeypot.
Stars: ✭ 410 (+811.11%)
HoneypotLow interaction honeypot that displays real time attacks
Stars: ✭ 348 (+673.33%)
SnareSuper Next generation Advanced Reactive honEypot
Stars: ✭ 311 (+591.11%)
HeraldingCredentials catching honeypot
Stars: ✭ 297 (+560%)
WirespyFramework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Stars: ✭ 293 (+551.11%)
Django Honeypot🍯 Generic honeypot utilities for use in django projects.
Stars: ✭ 284 (+531.11%)
DejavuDejaVU - Open Source Deception Framework
Stars: ✭ 265 (+488.89%)
BurningDogsHoneypot log processor to create OTX Pulse entries
Stars: ✭ 31 (-31.11%)
sshsyrupA low-to-medium interaction SSH Honeypot with features to capture terminal activity and upload to asciinema.org
Stars: ✭ 84 (+86.67%)
Awesome-DeceptionAn awesome list of resources on deception-based security with honeypots and honeytokens
Stars: ✭ 61 (+35.56%)
anti-honeypot一款可以检测WEB蜜罐并阻断请求的Chrome插件,能够识别并阻断长亭D-sensor、墨安幻阵的部分溯源api
Stars: ✭ 38 (-15.56%)
techmapHoneypot's Tech Map
Stars: ✭ 43 (-4.44%)
BootsyDesigned to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
Stars: ✭ 33 (-26.67%)