phoneyc
Shellcode detector
A tool used to detect and analyze malicious shellcode in web pages
25 stars
10 watching
9 forks
Language: C
last commit: over 9 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
securitygeneration/honeyport | A security tool that detects and blocks malicious connections to identify targeted attackers | 43 |
phype/telnet-iot-honeypot | Detects and analyzes Botnet connections to identify malware patterns and networks | 305 |
run41/honey_ports | A honeypot solution to detect port scanning on networks by imitating common ports and logging suspicious activity. | 7 |
chh/stack-honeypot | A middleware that inserts a trap into responses to detect and prevent spam bot attempts. | 23 |
sahilm/hived | A honeypot system that detects and reports malicious network activity | 3 |
mdp/honeypot.go | A tool to detect and track unauthorized SSH attempts on a public machine | 28 |
stamparm/hontel | A honeypot system that simulates a Telnet service to detect and study botnet attacks | 161 |
lcatro/webshell-detect-by-machine-learning | An AI-powered tool to detect web shells in code by analyzing patterns with machine learning algorithms. | 126 |
blaverick62/siren | A network-based system for detecting and mitigating malicious activity | 13 |
0x4d31/honeylambda | A simple serverless application designed to create and monitor fake HTTP endpoints for security testing | 511 |
johnnykv/heralding | A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 376 |
naorlivne/dshp | A simple honeypot system designed to detect and respond to unauthorized access attempts | 16 |
referefref/honeydet | A signature-based honeypot detection tool that uses multi-step and protocol-specific detection methods to identify potential security threats | 84 |
morian/blacknet | A honeypot system designed to detect and log SSH attempts on multiple IP addresses. | 21 |
cymmetria/strutshoneypot | A honeypot designed to detect and prevent exploitation of a specific Apache Struts vulnerability | 72 |