0x4D31 / honeybitsLinks
A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the attacker toward your honeypots
☆276Updated 6 years ago
Alternatives and similar repositories for honeybits
Users that are interested in honeybits are comparing it to the libraries listed below
Sorting:
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆291Updated 8 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆552Updated 2 years ago
- ☆176Updated 5 years ago
- A modular Python application to collect intelligence for malicious hosts.☆271Updated 4 years ago
- 16,432 Free Yara rules created by☆391Updated 6 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- A Simple Elasticsearch Honeypot☆189Updated 10 years ago
- Passive DNS collection using Zeek☆182Updated 2 years ago
- Vulnerability Data in ES☆143Updated 8 years ago
- Cross-platform Yara scanner written in Go☆328Updated 2 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Updated 2 years ago
- Open Source Threat Intelligence Chat Bot☆321Updated 5 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 4 years ago
- The Seeker of IOC☆131Updated 5 years ago
- Version 2 of the ThreatCrowd API☆273Updated 2 years ago
- Honeypot Intelligence with Splunk☆257Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Updated 8 years ago
- passivedns-client provides a library and a query tool for querying several passive DNS providers☆201Updated 4 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Updated 6 years ago
- Honeypot deployment made easy☆237Updated 6 years ago
- Generic Low Interaction Honeypot☆294Updated 3 weeks ago
- Threat Intelligence APIs☆282Updated 2 years ago
- Query and report user logons relations from MS Windows Security Events☆243Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated 2 years ago
- DejaVU - Open Source Deception Framework☆425Updated 5 months ago
- Automated Tactics Techniques & Procedures☆260Updated 2 years ago
- ☆206Updated 2 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Updated 7 months ago
- Detecting ATT&CK techniques & tactics for Linux☆257Updated 5 years ago