Nirusu / how-to-setup-a-honeypotLinks
How to setup a honeypot with an IDS, ELK and TLS traffic inspection
☆158Updated 2 years ago
Alternatives and similar repositories for how-to-setup-a-honeypot
Users that are interested in how-to-setup-a-honeypot are comparing it to the libraries listed below
Sorting:
- Pwnspoof repository☆262Updated last year
- Creation of a laboratory for malware analysis in AWS☆100Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆144Updated 3 months ago
- Data visualization for blue teams☆126Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- MISP Playbooks☆203Updated 2 weeks ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 9 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆203Updated 2 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆191Updated 11 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- Threat Intel Platform for T-POTs☆153Updated this week
- Blue Team detection lab created with Terraform and Ansible in Azure.☆160Updated 7 months ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated 11 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Updated 7 months ago
- Automated security lab provisioning☆77Updated this week
- God Mode Detection Rules☆134Updated 10 months ago
- Signature based honeypot detector tool written in Golang☆97Updated 3 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Rapidly Search and Hunt through Linux Forensics Artifacts☆193Updated last year
- CLI tools for forensic investigation of Windows artifacts☆342Updated 7 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- ☆143Updated 3 weeks ago
- ☆204Updated 3 weeks ago
- Active C&C Detector☆154Updated last year
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- Signatures and IoCs from public Volexity blog posts.☆355Updated last month
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆367Updated 2 years ago
- Rules generated from our investigations.☆195Updated last week