Nirusu / how-to-setup-a-honeypotView external linksLinks
How to setup a honeypot with an IDS, ELK and TLS traffic inspection
☆164Jul 11, 2022Updated 3 years ago
Alternatives and similar repositories for how-to-setup-a-honeypot
Users that are interested in how-to-setup-a-honeypot are comparing it to the libraries listed below
Sorting:
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- PoC☆12Apr 7, 2025Updated 10 months ago
- ☆12Nov 25, 2020Updated 5 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- An Adaptive Misuse Detection System☆46Nov 4, 2024Updated last year
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Apr 25, 2025Updated 9 months ago
- ☆133Jan 25, 2023Updated 3 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆745Feb 9, 2026Updated last week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- Hfinger - fingerprinting HTTP requests☆142May 16, 2023Updated 2 years ago
- ☆69May 3, 2021Updated 4 years ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- ☆12Dec 26, 2022Updated 3 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 3 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 7 months ago
- ☆43May 22, 2021Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- ☆16May 9, 2016Updated 9 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Extensions for Zeek's Intelligence Framework.☆11Mar 1, 2022Updated 3 years ago
- Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace☆24Jul 19, 2023Updated 2 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Updated this week
- ☆12Jun 29, 2021Updated 4 years ago
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,204Dec 29, 2025Updated last month