Serverless honeytoken π΅π»ββοΈ
β81Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for Trapdoor
Users that are interested in Trapdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Canary which fires when uninstalledβ34Mar 16, 2021Updated 5 years ago
- Zeek package to generate a SMB client fingerprintβ27May 5, 2020Updated 5 years ago
- Automatic detection engineering technical state complianceβ55Jul 7, 2024Updated last year
- honeyΞ» - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on topβ¦β523Oct 20, 2018Updated 7 years ago
- Automation of VPC Traffic Mirror Sessions in AWSβ35Nov 15, 2025Updated 4 months ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures β‘οΈ MITRE ATT&CK Navigatorβ91Dec 8, 2022Updated 3 years ago
- Low-interaction VNC honeypot with a static challenge.β23Aug 10, 2019Updated 6 years ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWSβ15Oct 16, 2020Updated 5 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the attβ¦β277Mar 20, 2019Updated 7 years ago
- Python tool for exploiting CVE-2021-35616β11Dec 3, 2021Updated 4 years ago
- Malware samples observed in the wild from time to timeβ12Jul 29, 2019Updated 6 years ago
- A website and framework for testing NIDS detectionβ57Aug 29, 2021Updated 4 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fattβ40Jun 20, 2023Updated 2 years ago
- An Ansible role for installing Cobalt Strike.β80Mar 13, 2026Updated last week
- A tool to help malware analysts signature unique parts of RTF documentsβ28Jan 5, 2026Updated 2 months ago
- Toolset for research malware and Cobalt Strike beaconsβ211Mar 11, 2025Updated last year
- β12Jul 15, 2022Updated 3 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprintsβ¦β546May 1, 2025Updated 10 months ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashesβ11Jun 3, 2020Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysisβ43Sep 18, 2018Updated 7 years ago
- A collection of typical false positive indicatorsβ56Dec 5, 2020Updated 5 years ago
- β11Jun 9, 2020Updated 5 years ago
- β15May 6, 2021Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)β52Nov 27, 2020Updated 5 years ago
- A tool to modify timestamps in a packet capture to a user selected dateβ31Aug 11, 2021Updated 4 years ago
- Recipes for GCHQ's CyberChef Web Appβ39Nov 15, 2018Updated 7 years ago
- A production-friendly malware scanner for your AWS cloudβ201Jul 14, 2021Updated 4 years ago
- Reproducible and extensible BloodHound playbooksβ44Jan 20, 2020Updated 6 years ago
- A python package for use in generating fake data for SOC and security automation.β175Mar 7, 2025Updated last year
- An extendable tool to extract and aggregate IoCs from threat feedsβ33Feb 6, 2024Updated 2 years ago
- β20Updated this week
- β21Nov 7, 2023Updated 2 years ago
- Active Directory Purple Team Playbookβ116May 8, 2023Updated 2 years ago
- β20Feb 22, 2021Updated 5 years ago
- Searches For Threat Hunting and Security Analyticsβ238Mar 26, 2025Updated 11 months ago
- CarbonBlack EDR detection rules and response actionsβ73Sep 10, 2024Updated last year
- Web Application for domain name monitoring / alertingβ65Aug 1, 2024Updated last year
- Tool for signing and verifying the integrity of CloudFormation templatesβ15Feb 16, 2023Updated 3 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.β69Nov 11, 2023Updated 2 years ago