How to setup a honeypot with an IDS, ELK and TLS traffic inspection
☆164Jul 11, 2022Updated 3 years ago
Alternatives and similar repositories for how-to-setup-a-honeypot
Users that are interested in how-to-setup-a-honeypot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC☆12Apr 7, 2025Updated last year
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 9 months ago
- Log4j honeypot to capture payloads within HTTP headers, query parameters and POST requests.☆14Dec 15, 2021Updated 4 years ago
- Source of the project website☆25Apr 6, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- ☆76Oct 16, 2022Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆26May 6, 2024Updated 2 years ago
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- Sentinel Guard - Use to build up Honeypot and Honeynet with ZERO cost easily and simply.☆18Jul 25, 2021Updated 4 years ago
- Extensions for Zeek's Intelligence Framework.☆11Mar 1, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A high-interaction virtual honeypot for ICS that provides physical process simulation☆21May 10, 2024Updated last year
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆96Apr 25, 2025Updated last year
- ☆12Nov 25, 2020Updated 5 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 10 months ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Diaphora Machine Learning tools and datasets☆23Sep 23, 2024Updated last year
- ☆70May 3, 2021Updated 5 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 4 months ago
- Modular malware analysis artifact collection and correlation framework☆56Apr 23, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆34Aug 8, 2023Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆772Apr 13, 2026Updated 3 weeks ago
- BlueHound - pinpoint the security issues that actually matter☆763Jul 12, 2023Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 5 years ago
- Zeek Training Materials/Products☆44Apr 21, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Hfinger - fingerprinting HTTP requests☆143May 16, 2023Updated 2 years ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- dvp-pc : keep code☆17Jun 14, 2018Updated 7 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 5 months ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Repo Filled With Follow Along Guides☆81Jun 8, 2022Updated 3 years ago