BinaryDefense / log4j-honeypot-flaskLinks
Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228
☆151Updated 3 years ago
Alternatives and similar repositories for log4j-honeypot-flask
Users that are interested in log4j-honeypot-flask are comparing it to the libraries listed below
Sorting:
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- ☆190Updated 2 weeks ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆156Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Audit Windows Security with best Practice☆191Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 3 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆160Updated 3 years ago
- CrowdStrike Archive Scan Tool☆85Updated 3 years ago
- ☆70Updated 4 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 6 months ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Updated 6 years ago
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆40Updated 4 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- ATTPwn☆215Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Updated 3 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆205Updated 5 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- Blueteam operational triage registry hunting/forensic tool.☆150Updated last month
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆151Updated last year
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 11 months ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- Pwnspoof repository☆264Updated 2 years ago
- Collection of created MindMaps☆151Updated last year
- Collection of useful Canary tools☆92Updated 2 weeks ago