Nirusu / how-to-setup-a-honeypotLinks
How to setup a honeypot with an IDS, ELK and TLS traffic inspection
☆163Updated 3 years ago
Alternatives and similar repositories for how-to-setup-a-honeypot
Users that are interested in how-to-setup-a-honeypot are comparing it to the libraries listed below
Sorting:
- Data visualization for blue teams☆126Updated 2 years ago
- Pwnspoof repository☆264Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Open Threat Hunting Framework☆121Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- God Mode Detection Rules☆134Updated last year
- Threat Intel Platform for T-POTs☆158Updated last week
- MISP Playbooks☆215Updated 2 weeks ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆200Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆181Updated 3 weeks ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆166Updated 11 months ago
- IOCs published by Black Lotus Labs☆123Updated this week
- Jupyter Notebooks for the Blue Team☆147Updated 7 months ago
- MITRE Caldera™ for OT Plugins & Capabilities☆227Updated 2 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Free training course offered at Hack Space Con 2023☆139Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆129Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…