0x4D31 / honeybits
A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the attacker toward your honeypots
☆274Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for honeybits
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆285Updated 7 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆537Updated last year
- Code + documentation for the public GreyNoise API☆313Updated 3 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆367Updated 5 years ago
- 16,432 Free Yara rules created by☆380Updated 5 years ago
- Automated Tactics Techniques & Procedures☆250Updated last year
- ☆173Updated 3 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Cross-platform Yara scanner written in Go☆330Updated last year
- Machinae Security Intelligence Collector☆504Updated 6 months ago
- Next Generation Firewall Audit and Bypass Tool☆260Updated 7 years ago
- Respounder detects presence of responder in the network.☆314Updated 5 years ago
- DPS' Lightweight Investigation Notebook☆423Updated 10 months ago
- Vulnerability Data in ES☆146Updated 7 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- A modular Python application to collect intelligence for malicious hosts.☆262Updated 3 years ago
- Passive DNS collection using Zeek☆181Updated last year
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 2 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆234Updated last year
- DejaVU - Open Source Deception Framework☆400Updated last year
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆148Updated 6 months ago
- Web App for Volatility framework☆380Updated this week
- Query and report user logons relations from MS Windows Security Events☆240Updated 6 years ago
- ☆506Updated 3 years ago
- Collecting & Hunting for IOCs with gusto and style☆236Updated 3 years ago
- Honeypot deployment made easy☆235Updated 5 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆263Updated 3 years ago
- The Seeker of IOC☆129Updated 4 years ago
- ☆309Updated 7 years ago