adhdproject / cowrieLinks
Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io
☆12Updated 5 years ago
Alternatives and similar repositories for cowrie
Users that are interested in cowrie are comparing it to the libraries listed below
Sorting:
- ☆53Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- Tools for simulating threats☆197Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆69Updated 4 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated last week
- This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.☆76Updated 2 months ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆203Updated last week
- A collection of companies that disclose adversary TTPs after they have been breached☆291Updated 2 weeks ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Updated 3 years ago
- ☆63Updated 4 years ago
- Security Operations Chef☆49Updated last week
- Halberd : Multi-Cloud Agentic Attack Tool☆321Updated 3 weeks ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆410Updated 6 months ago
- The latest pyWars client for the SEC573 class☆47Updated 8 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆110Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆117Updated last year
- Repo for Concierge AI dev work☆197Updated this week
- Docker Crash Course: How to containerize your favorite security tools☆28Updated 2 years ago
- /dev/tty☆27Updated 2 weeks ago
- InsightVM helpful SQL queries☆75Updated 9 months ago
- ☆188Updated last year
- Knowledge base on cybercriminal concealment techniques☆80Updated 6 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- ☆96Updated 3 months ago
- ☆78Updated 4 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆44Updated 8 months ago
- A starter pack of resources to help you get started in Detection Engineering.☆175Updated 3 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated 2 years ago
- ☆31Updated 3 months ago
- Internal Network Penetration Test Playbook☆17Updated 3 years ago