Honeybadger Red Edition
☆13Sep 13, 2017Updated 8 years ago
Alternatives and similar repositories for honeybadger-red
Users that are interested in honeybadger-red are comparing it to the libraries listed below
Sorting:
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆25Jun 19, 2017Updated 8 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- ☆203Oct 31, 2021Updated 4 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆24Jun 18, 2018Updated 7 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- LackeyCCG plugin for Star Wars: Trading Card Game☆12Updated this week
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- ☆40Nov 29, 2024Updated last year
- ☆34Apr 29, 2021Updated 4 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- "Sonic Kernel Testing" - a Linux Kernel testing tool - moved to gitlab.com☆11May 25, 2020Updated 5 years ago
- I use powershell to help me in my work as a consultant to make make my work simpler and some of those script I like to share☆10Jul 2, 2025Updated 8 months ago
- The Second Version of Car Demo☆12Jan 6, 2023Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- A simple script for plotting the flight path of aircraft from ADS-B packet data☆12Jan 25, 2018Updated 8 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Common packages for Heron.☆11Aug 9, 2022Updated 3 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- Install your remote server for the Lamassu Cryptomat☆18Feb 16, 2026Updated 2 weeks ago
- Collection of "official" ontologies of universAAL, which play the role of data model☆13Apr 10, 2025Updated 10 months ago