0x4D31 / honeybits
A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the attacker toward your honeypots
☆272Updated 6 years ago
Alternatives and similar repositories for honeybits:
Users that are interested in honeybits are comparing it to the libraries listed below
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated last year
- Code + documentation for the public GreyNoise API☆314Updated 3 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆381Updated 5 years ago
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- Next Generation Firewall Audit and Bypass Tool☆263Updated 7 years ago
- Vulnerability Data in ES☆145Updated 7 years ago
- Honeypot deployment made easy☆235Updated 6 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- Passive DNS collection using Zeek☆182Updated last year
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆367Updated 6 years ago
- ☆175Updated 4 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆721Updated 5 years ago
- Differential Analysis of Malware in Memory☆211Updated 7 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- Respounder detects presence of responder in the network.☆315Updated 5 years ago
- Machinae Security Intelligence Collector☆508Updated 10 months ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- Internet data acquisition☆149Updated 4 years ago
- Test Blue Team detections without running any attack.☆272Updated 10 months ago
- A modular Python application to collect intelligence for malicious hosts.☆265Updated 3 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Automated Tactics Techniques & Procedures☆253Updated last year
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- A list of published research documents☆241Updated 8 months ago
- ☆168Updated 3 years ago