Nirusu / how-to-setup-a-honeypot
How to setup a honeypot with an IDS, ELK and TLS traffic inspection
☆150Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for how-to-setup-a-honeypot
- Rapidly Search and Hunt through Linux Forensics Artifacts☆181Updated 10 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆194Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆144Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆252Updated this week
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆126Updated last year
- Rules generated from our investigations.☆189Updated 3 weeks ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Free training course offered at Hack Space Con 2023☆133Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆105Updated this week
- Repository of attack and defensive information for Business Email Compromise investigations☆230Updated 2 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆169Updated 4 months ago
- Data visualization for blue teams☆124Updated last year
- God Mode Detection Rules☆131Updated 3 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆201Updated this week
- Pwnspoof repository☆257Updated last year
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆146Updated this week
- MISP Playbooks☆174Updated this week
- Blue Team detection lab created with Terraform and Ansible in Azure.☆143Updated this week
- Jupyter Notebooks for the Blue Team☆141Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆49Updated last month
- Forensic Artifact Collection Tool Matrix☆75Updated 2 weeks ago
- A python script developed to process Windows memory images based on triage type.☆258Updated 11 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆166Updated last week
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆270Updated 3 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆182Updated 2 months ago
- Creation of a laboratory for malware analysis in AWS☆86Updated last year