BinaryDefense / log4j-honeypot-flask
Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228
☆149Updated 3 years ago
Alternatives and similar repositories for log4j-honeypot-flask:
Users that are interested in log4j-honeypot-flask are comparing it to the libraries listed below
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆252Updated 2 years ago
- ☆160Updated last year
- Hashes for vulnerable LOG4J versions☆153Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 3 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- Pwnspoof repository☆258Updated last year
- Sysmon EDR POC Build within Powershell to prove ability.☆221Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Updated 2 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- A list of my personal projects☆175Updated 2 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆151Updated 3 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 3 years ago
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆144Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated last month
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆92Updated 3 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆200Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆176Updated 2 years ago
- Build a attack range in your local machine☆130Updated last year
- Blue Team detection lab created with Terraform and Ansible in Azure.☆147Updated 3 months ago
- My conference presentations☆66Updated last year
- ☆64Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆457Updated 8 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆198Updated 4 years ago
- Audit Windows Security with best Practice☆182Updated 5 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆278Updated 6 months ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated 7 months ago