Nirusu / how-to-setup-a-honeypot
How to setup a honeypot with an IDS, ELK and TLS traffic inspection
☆156Updated 2 years ago
Alternatives and similar repositories for how-to-setup-a-honeypot:
Users that are interested in how-to-setup-a-honeypot are comparing it to the libraries listed below
- Free training course offered at Hack Space Con 2023☆137Updated last year
- MISP Playbooks☆184Updated last week
- Data visualization for blue teams☆125Updated 2 years ago
- ☆124Updated 2 weeks ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆145Updated 3 months ago
- Jupyter Notebooks for the Blue Team☆145Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆189Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆136Updated 9 months ago
- Docker image for Velocidex Velociraptor☆118Updated 7 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆200Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆260Updated last year
- Threat Intel Platform for T-POTs☆141Updated this week
- Open Threat Hunting Framework☆109Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆182Updated 7 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆177Updated this week
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 9 months ago
- God Mode Detection Rules☆134Updated 6 months ago
- Some Threat Hunting queries useful for blue teamers☆124Updated 2 years ago
- Detection Engineering with YARA☆87Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆277Updated 5 months ago
- Rules generated from our investigations.☆193Updated 3 months ago
- Resources To Learn And Understand SIGMA Rules☆174Updated 2 years ago
- Signatures and IoCs from public Volexity blog posts.☆348Updated last week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago
- MITRE Caldera™ for OT Plugins & Capabilities☆203Updated 3 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆281Updated 9 months ago
- CLI tools for forensic investigation of Windows artifacts☆325Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated last month