Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!
☆25Jun 19, 2017Updated 8 years ago
Alternatives and similar repositories for honeybits-win
Users that are interested in honeybits-win are comparing it to the libraries listed below
Sorting:
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 6 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Honeybadger Red Edition☆13Sep 13, 2017Updated 8 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Mar 29, 2021Updated 4 years ago
- Gather domains as a precursor to scanning☆21Feb 18, 2026Updated 2 weeks ago
- ☆34Apr 29, 2021Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- QUICk - a go library based on gopacket for analyzing QUIC CHLO messages☆22Jun 13, 2020Updated 5 years ago
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆25Jul 23, 2025Updated 7 months ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- For use in our Tenable.IO to AWS Security Hub integration☆28Sep 4, 2025Updated 6 months ago
- ☆54Jan 22, 2025Updated last year
- ☆25Feb 2, 2026Updated last month
- KIMS Multi AV Scanner by DSR!☆31Mar 17, 2020Updated 5 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- An extensible honeypot framework☆95Jul 15, 2022Updated 3 years ago
- ☆20Nov 29, 2023Updated 2 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Source Code - https://github.com/USStateDept/State-TalentMAP☆13Sep 12, 2023Updated 2 years ago
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Contract for a CryptoFiat currency☆11Aug 25, 2018Updated 7 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆48Updated this week
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- A Django vulnerable Web application for testing the w3af framework☆32Jul 6, 2022Updated 3 years ago
- Client library for the mwdb service by CERT Polska.☆42Feb 10, 2026Updated 3 weeks ago
- ☆40Nov 29, 2024Updated last year
- Prototypes for MineMeld nodes☆38Oct 15, 2021Updated 4 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 3 months ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- ☆236Jan 23, 2020Updated 6 years ago
- Cloud Trust Protocol Server☆11Jan 5, 2016Updated 10 years ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆17Sep 4, 2023Updated 2 years ago
- Documentation website source code for Concord☆15Feb 10, 2026Updated 3 weeks ago
- Linux Foundation Certified Engineer (LFCE) learning materials☆12Mar 6, 2022Updated 4 years ago