PrometheanInfoSec / honeybadger-redView external linksLinks
Honeybadger Red Edition
☆13Sep 13, 2017Updated 8 years ago
Alternatives and similar repositories for honeybadger-red
Users that are interested in honeybadger-red are comparing it to the libraries listed below
Sorting:
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆25Jun 19, 2017Updated 8 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- ☆202Oct 31, 2021Updated 4 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆24Jun 18, 2018Updated 7 years ago
- D4 core software (server and sample sensor client)☆42Dec 23, 2023Updated 2 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- LackeyCCG plugin for Star Wars: Trading Card Game☆12Feb 6, 2026Updated last week
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- ☆41Nov 29, 2024Updated last year
- ☆34Apr 29, 2021Updated 4 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- 🔥🔥🔥 AI security automation platform. Build visual workflows, deploy autonomous agents, and automate threat detection and response. 80+…☆27Updated this week
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/corkami☆10Mar 26, 2015Updated 10 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Install your remote server for the Lamassu Cryptomat☆18Jan 7, 2026Updated last month
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- IceDB S3 Proxy to trick S3 clients into only seeing alive files☆13Dec 24, 2023Updated 2 years ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 3 months ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Change your DNS from the toolbar in OSX (10.9+)☆17Mar 16, 2017Updated 8 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago