Serverless honeytoken 🕵🏻♂️
☆81Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for Trapdoor
Users that are interested in Trapdoor are comparing it to the libraries listed below
Sorting:
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆522Oct 20, 2018Updated 7 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- An Ansible role for installing Cobalt Strike.☆80Dec 22, 2025Updated 2 months ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Nov 15, 2025Updated 3 months ago
- A collection of presentations and other contributions I have made to conferences.☆36Sep 9, 2024Updated last year
- ☆20Feb 22, 2021Updated 5 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 6 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- Zeek script library for getting the effective TLD of a domain.☆13Apr 12, 2024Updated last year
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- ☆15May 6, 2021Updated 4 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- ☆190Feb 8, 2026Updated 3 weeks ago
- Active Directory Purple Team Playbook☆116May 8, 2023Updated 2 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated last month
- ☆12Nov 3, 2020Updated 5 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Searches For Threat Hunting and Security Analytics☆238Mar 26, 2025Updated 11 months ago
- ☆76Jun 5, 2018Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆545May 1, 2025Updated 10 months ago
- A production-friendly malware scanner for your AWS cloud☆201Jul 14, 2021Updated 4 years ago
- Python Script for SAML2 Authentication Passwordspray☆41Jul 5, 2023Updated 2 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated 11 months ago
- ☆12Jul 15, 2022Updated 3 years ago