tpotce VS pulledpork

Compare tpotce vs pulledpork and see what are their differences.

tpotce

๐Ÿฏ T-Pot - The All In One Honeypot Platform ๐Ÿ [Moved to: https://github.com/telekom-security/tpotce] (by dtag-dev-sec)

pulledpork

Pulled Pork for Snort and Suricata rule management (from Google code) (by shirkdog)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
tpotce pulledpork
- 2
2,461 415
- -
8.8 0.0
about 3 years ago almost 3 years ago
C Perl
GNU General Public License v3.0 only GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

tpotce

Posts with mentions or reviews of tpotce. We have used some of these posts to build our list of alternatives and similar projects.

We haven't tracked posts mentioning tpotce yet.
Tracking mentions began in Dec 2020.

pulledpork

Posts with mentions or reviews of pulledpork. We have used some of these posts to build our list of alternatives and similar projects.
  • Getting a lot of BF attempts on my server, any tips/ways to cut this out?
    1 project | /r/Fedora | 3 Jul 2021
    Snort on the other hand is a real full-featured IPS and much more powerful. Using them together can offload the processing work Snort needs to do though. You can use something like pulledpork to automatically update various rulesets for Snort as well (community, Talos (Cisco), etc.). Snort is also a big part of Cisco's FirePower firewalls.
  • Rules update during system installation
    1 project | /r/snort | 16 Feb 2021
    In the Github issues section, there's a 3 year old, still Open "Process Snort 3 Rules (https://github.com/shirkdog/pulledpork/issues/297)" issue. So that would get me questioning how they got it working in the guide at all...

What are some alternatives?

When comparing tpotce and pulledpork you can also consider the following projects:

tpotce - ๐Ÿฏ T-Pot - The All In One Multi Honeypot Platform ๐Ÿ

Munin - Main repository for munin master / node / plugins

cowrie - Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io

Rsnapshot - a tool for backing up your data using rsync (if you want to get help, use https://lists.sourceforge.net/lists/listinfo/rsnapshot-discuss)

how-to-setup-a-honeypot - How to setup a honeypot with an IDS, ELK and TLS traffic inspection

snort-rules - An UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases. [UnavailableForLegalReasons - Repository access blocked]

DDOS-RootSec - DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)

DecoyMini - ๐Ÿ A highly scalable, safe, free enterprise honeypots ไธ€ๆฌพ้ซ˜ๅฏๆ‰ฉๅฑ•ใ€ๅฎ‰ๅ…จใ€ๅ…่ดน็š„ไผไธš็บง่œœ็ฝ็ณป็ปŸ

mutablesecurity - CLI program for automating the setup, configuration, and use of cybersecurity solutions