BinaryDefense / log4j-honeypot-flaskLinks
Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228
☆149Updated 3 years ago
Alternatives and similar repositories for log4j-honeypot-flask
Users that are interested in log4j-honeypot-flask are comparing it to the libraries listed below
Sorting:
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆257Updated 2 years ago
- ☆163Updated last year
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Updated 2 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆159Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Pwnspoof repository☆261Updated last year
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆147Updated last year
- Blue Team detection lab created with Terraform and Ansible in Azure.☆158Updated 6 months ago
- A list of my personal projects☆177Updated 2 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated last month
- Sysmon EDR POC Build within Powershell to prove ability.☆224Updated 4 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- ATTPwn☆213Updated last year
- Audit Windows Security with best Practice☆184Updated 8 months ago
- Fast offline auditing of Active Directory passwords using Python.☆163Updated 9 months ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆92Updated 2 months ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆92Updated 6 months ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Updated 5 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆465Updated 10 months ago
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆202Updated 2 years ago
- A modular OSINT honeypot for blue teamers☆334Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 3 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated 10 months ago