Skip to content

Globally distributed honeypots and HoneyNets IOCs and file reversing

Notifications You must be signed in to change notification settings

conexioninversa/WOPR

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation


War Operative Plan Response

List of aggregated and summarized files from a network of global honeypots that belong to a personal investigation.

Files:

  • MaliciousIP.txt - List of malicious IPs that have been successful in a honeypot attack
  • C2_BruteRatel.txt - List of adversary Command & Control from Brute Ratel framework
  • C2_CobaltStrikeBeacon.txt - List of adversary Command & Control from Cobalt Strike Beacons
  • C2_Metasploit.txt - List of adversary Command & Control from Metasploit Framework
  • C2_Covenant.txt - List of adversary Command & Control from Covenant
  • C2_Mythic.txt - List of adversary Command & Control from Mythic Framework
  • C2_All.txt - Contains all the CSV files grouped in a single file
  • C2_statistics_All.txt - Contains the statistics of the malicious IPs of the entire C2_All.csv file in the last 24 hours
  • C2_GeoLocation.txt - Geolocations of the malicious IPs of the entire C2_All.csv file in the last 24 hours
  • Malicious_IP_C2_All.txt - Contains the malicious IPs of the adversaries of all the C2_ files in the last 24 hours
  • last24hours_Malwarehashes.txt - Malicious hashes obtained in the last 24 hours
  • C2_Deimos - List of adversary Command & Control from Deimos Fraework
  • C2_Panda - List of adversary Command & Control
  • C2_PoweSploit - List of adversary Command & Control
  • C2_Posh - List of adversary Command & Control Framework

Files directory maps:

  • attackerconnection.png - Graph of interest of the attacks received towards the honey located in Ukraine (coming soon)
  • attackersmap.png - Graph that obtains the origin of the attacks (coming soon)

Files directory raw_config_C2:

  • C2_BruteRatel.json - List of raw format
  • C2_CobaltStrikeBeacon.json - List of raw format
  • C2_Metasploit.json - List of raw format
  • C2_Covenant.json - List of raw format
  • C2_Mythic.json - List of raw format
  • C2_Deimos.json - List of raw format
  • C2_Panda.json - List of raw format
  • C2_PowerSploit.json - List of raw format
  • C2_Posh.json - List of raw format

Notes:

  • All files are updated every hour except Brute rate, Covenant, Mythic, CobaltStrike, Metasploit, Deimos, Panda, PowerSploit, Posh and C2_All.csv files that are updated daily at 7:25 a.m.(CET)
  • The honeypot network is distributed in most countries of the world. Especially in those countries at war or with a situation of diplomatic crisis between power zones.
  • Most of the honeypots are highly interactive and many of them pretend to be from departmental governments, technology industry, aerospace and military.

Map of the origins of the command & control

Relations from virustotal

Map of the origins of the attacks since January 2023

Representative map of attacks received on Ukraine since January 2023

Representative map of BrutelRatel attack origins

Representative map of CobaltStrike attack origins

Representative map of Covenant attack origins

Representative map of Mythic attack origins

Representative map of Metasploit attack origins

About

Globally distributed honeypots and HoneyNets IOCs and file reversing

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published