Nirusu / how-to-setup-a-honeypot
How to setup a honeypot with an IDS, ELK and TLS traffic inspection
☆154Updated 2 years ago
Alternatives and similar repositories for how-to-setup-a-honeypot:
Users that are interested in how-to-setup-a-honeypot are comparing it to the libraries listed below
- Creation of a laboratory for malware analysis in AWS☆90Updated 2 years ago
- Open Threat Hunting Framework☆105Updated last year
- Free training course offered at Hack Space Con 2023☆136Updated last year
- Repository resource for threat hunter☆158Updated 6 years ago
- Data visualization for blue teams☆124Updated last year
- Pwnspoof repository☆257Updated last year
- Jupyter Notebooks for the Blue Team☆143Updated 2 years ago
- MISP Playbooks☆182Updated last month
- Rapidly Search and Hunt through Linux Forensics Artifacts☆183Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆74Updated 2 years ago
- Rules generated from our investigations.☆188Updated 2 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆199Updated 2 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated 6 months ago
- A semi-curated list of Security Feeds☆122Updated 2 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆178Updated 6 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- God Mode Detection Rules☆133Updated 5 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆143Updated last month
- HASH (HTTP Agnostic Software Honeypot)☆133Updated 8 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆50Updated last week
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated 8 months ago
- Signatures and IoCs from public Volexity blog posts.☆344Updated last month
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆277Updated 8 months ago
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆159Updated last year
- ☆121Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆145Updated 3 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆230Updated this week