Nirusu / how-to-setup-a-honeypotLinks
How to setup a honeypot with an IDS, ELK and TLS traffic inspection
☆157Updated 2 years ago
Alternatives and similar repositories for how-to-setup-a-honeypot
Users that are interested in how-to-setup-a-honeypot are comparing it to the libraries listed below
Sorting:
- Data visualization for blue teams☆126Updated 2 years ago
- ☆141Updated 3 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆195Updated 4 months ago
- MISP Playbooks☆201Updated 3 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆193Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆313Updated 3 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- Pwnspoof repository☆261Updated last year
- Completely Risky Active-Directory Simulation Hub☆100Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated 6 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆190Updated 11 months ago
- Rules generated from our investigations.☆195Updated this week
- Creation of a laboratory for malware analysis in AWS☆97Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- A repository of credential stealer formats☆217Updated 2 months ago
- Threat Intel Platform for T-POTs☆149Updated last week
- CLI tools for forensic investigation of Windows artifacts☆339Updated 7 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 8 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆202Updated 2 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated 10 months ago
- God Mode Detection Rules☆134Updated 9 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 4 months ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago