Nirusu / how-to-setup-a-honeypotLinks
How to setup a honeypot with an IDS, ELK and TLS traffic inspection
☆164Updated 3 years ago
Alternatives and similar repositories for how-to-setup-a-honeypot
Users that are interested in how-to-setup-a-honeypot are comparing it to the libraries listed below
Sorting:
- Pwnspoof repository☆264Updated 2 years ago
- Data visualization for blue teams☆126Updated 3 years ago
- Open Threat Hunting Framework☆123Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- God Mode Detection Rules☆135Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆55Updated 2 months ago
- Threat Intel Platform for T-POTs☆162Updated this week
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated last year
- Repository resource for threat hunter☆158Updated 7 years ago
- IOCs published by Black Lotus Labs☆124Updated 2 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- MISP Playbooks☆221Updated 3 months ago
- A PoC ransomware sample to test out your ransomware response strategy.☆212Updated 2 months ago
- Jupyter Notebooks for the Blue Team☆145Updated 9 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆289Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆175Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago
- A repository of credential stealer formats☆238Updated 7 months ago
- 🐍 High-performance, multi-threaded YARA & IOC scanner☆229Updated this week
- A runbook for handling security incidents in cooperation with 0xsyr0☆52Updated 3 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆180Updated 7 months ago