leverage github descriptions instead

This commit is contained in:
jose nazario 2022-05-17 12:00:26 -04:00 committed by GitHub
parent ffe213f527
commit 7a7bbb17eb
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 2 additions and 2 deletions

View File

@ -116,7 +116,7 @@ Discover more awesome lists at [sindresorhus/awesome](https://github.com/sindres
- Other/random
- [Damn Simple Honeypot (DSHP)](https://github.com/naorlivne/dshp) - Honeypot framework with pluggable handlers.
- [Masscanned](https://github.com/ivre/masscanned) - a network responder. Its purpose is to provide generic answers to as many protocols as possible, and with as few assumptions as possible on the client's intentions, to interact with scanners and opportunistic bots as far as possible.
- [Masscanned](https://github.com/ivre/masscanned) - Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
- [NOVA](https://github.com/DataSoft/Nova) - Uses honeypots as detectors, looks like a complete system.
- [OpenFlow Honeypot (OFPot)](https://github.com/upa/ofpot) - Redirects traffic for unused IPs to a honeypot, built on POX.
- [OpenCanary](https://github.com/thinkst/opencanary) - Modular and decentralised honeypot daemon that runs several canary versions of services that alerts when a service is (ab)used.
@ -494,7 +494,7 @@ Discover more awesome lists at [sindresorhus/awesome](https://github.com/sindres
- [HoneyMap](https://github.com/fw42/honeymap) - Real-time websocket stream of GPS events on a fancy SVG world map.
- [HoneyStats](https://sourceforge.net/projects/honeystats/) - Statistical view of the recorded activity on a Honeynet.
- [HpfeedsHoneyGraph](https://github.com/yuchincheng/HpfeedsHoneyGraph) - Visualization app to visualize hpfeeds logs.
- [IVRE](https://github.com/ivre/ivre) - A *network recon framework* that can be used to handle data generated with [Masscanned](https://github.com/ivre/masscanned), and/or scan the scanners that hit your honeypots. For some examples, see [Who's attacking me?](https://isc.sans.edu/forums/diary/Whos+Attacking+Me/21933/) and [Three honeypots and a month after](https://www.serializing.me/2019/01/27/three-honeypots-and-a-month-after/). See also [the website](https://ivre.rocks/) and [some use cases](https://doc.ivre.rocks/en/latest/usage/use-cases.html).
- [IVRE](https://github.com/ivre/ivre) - Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
- [Kippo stats](https://github.com/mfontani/kippo-stats) - Mojolicious app to display statistics for your kippo SSH honeypot.
- [Kippo-Graph](https://bruteforcelab.com/kippo-graph) - Full featured script to visualize statistics from a Kippo SSH honeypot.
- [The Intelligent HoneyNet](https://github.com/jpyorre/IntelligentHoneyNet) - Create actionable information from honeypots.