Nirusu / how-to-setup-a-honeypot
How to setup a honeypot with an IDS, ELK and TLS traffic inspection
☆157Updated 2 years ago
Alternatives and similar repositories for how-to-setup-a-honeypot:
Users that are interested in how-to-setup-a-honeypot are comparing it to the libraries listed below
- Jupyter Notebooks for the Blue Team☆145Updated this week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆183Updated 8 months ago
- Free training course offered at Hack Space Con 2023☆138Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 11 months ago
- Creation of a laboratory for malware analysis in AWS☆95Updated 2 years ago
- MISP Playbooks☆188Updated last month
- Data visualization for blue teams☆125Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 11 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆188Updated last year
- God Mode Detection Rules☆134Updated 7 months ago
- CLI tools for forensic investigation of Windows artifacts☆326Updated 4 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆185Updated this week
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- Mapping of open-source detection rules and atomic tests.☆156Updated 2 months ago
- ☆126Updated 3 weeks ago
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- Canary Detection☆164Updated 11 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated last month
- Automated YARA Rule Standardization and Quality Assurance Tool☆200Updated this week
- ☆200Updated last year
- Resources To Learn And Understand SIGMA Rules☆173Updated 2 years ago
- ☆118Updated 11 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆266Updated last week
- Blue Team detection lab created with Terraform and Ansible in Azure.☆149Updated 4 months ago
- Rules generated from our investigations.☆192Updated this week