heralding
Malware detector
A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services
Credentials catching honeypot
376 stars
26 watching
79 forks
Language: Python
last commit: 6 months ago
Linked from 1 awesome list
deceptionhoneypotsecuritysecurity-tools
Related projects:
Repository | Description | Stars |
---|---|---|
bartnv/portlurker | A network honeypot that uses protocol guessing and safe string display to detect potential security threats. | 31 |
chh/stack-honeypot | A middleware that inserts a trap into responses to detect and prevent spam bot attempts. | 23 |
naorlivne/dshp | A simple honeypot system designed to detect and respond to unauthorized access attempts | 16 |
keithjjones/fileintel | A tool to collect intelligence about malicious files by querying various sources and outputting the results in CSV format. | 118 |
phype/telnet-iot-honeypot | Detects and analyzes Botnet connections to identify malware patterns and networks | 305 |
buzzer-re/shinigami | An experimental tool designed to detect and unpack malware implants injected via process hollowing or generic packer routines. | 128 |
alexander-h-liu/malconv-pytorch | An implementation of MalConv for malware detection using PyTorch | 70 |
gosecure/malware-ioc | Provides a set of standardized indicators to help detect and assess malware presence | 10 |
securitygeneration/honeyport | A security tool that detects and blocks malicious connections to identify targeted attackers | 43 |
jadb/honeypot | A PHP SDK for detecting and mitigating malicious traffic by identifying suspicious IP addresses and URLs. | 3 |
dragokas/hijackthis | Scans for and identifies malicious system modifications | 699 |
revengecoming/demonhunter | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 60 |
joxeankoret/pyew | A command-line tool for analyzing malware and disassembling binary files | 383 |
canadianjeff/honeywrt | An intrusion detection system that mimics vulnerable services to attract and detect attackers | 21 |
jzadeh/aktaion | A lightweight tool for detecting exploits and generating policies based on micro behaviors of malicious activities | 142 |