0x4D31 / honeybits-winLinks
Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!
☆25Updated 8 years ago
Alternatives and similar repositories for honeybits-win
Users that are interested in honeybits-win are comparing it to the libraries listed below
Sorting:
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- ☆76Updated 7 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Updated 7 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆73Updated 4 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- automate your MISP installs☆68Updated 5 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- Repository of yara rules☆60Updated 3 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 8 years ago
- ☆30Updated 7 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Tools for the Computer Incident Response Team☆147Updated 8 years ago
- Presentation Slides and Video links☆32Updated 4 years ago
- ☆77Updated 6 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆95Updated 8 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 2 months ago
- ☆35Updated 4 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆41Updated 9 years ago
- Repository for my ATT&CK analysis research.☆69Updated 6 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 2 years ago
- ☆53Updated 7 years ago