CommunityHoneyNetwork / rdphoneyLinks
Basic RDP honeypot script
☆32Updated 2 years ago
Alternatives and similar repositories for rdphoney
Users that are interested in rdphoney are comparing it to the libraries listed below
Sorting:
- CVE2020-0796 SMBv3 RCE☆61Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- ☆50Updated 4 years ago
- Tracking APT IOCs☆25Updated 4 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago
- volatility explorer☆91Updated 4 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- initial commit☆44Updated 6 months ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Updated 2 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Updated 2 months ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- ssdeep cluster analysis for malware files☆30Updated 5 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Bro integration with osquery☆15Updated 2 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Updated 5 years ago
- IoC's, PCRE's, YARA's etc☆24Updated 2 months ago
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆15Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago