adhdproject / cowrieLinks
Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io
☆11Updated 4 years ago
Alternatives and similar repositories for cowrie
Users that are interested in cowrie are comparing it to the libraries listed below
Sorting:
- /dev/tty☆27Updated last month
- ☆59Updated 4 years ago
- ☆46Updated last year
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆35Updated last year
- The latest pyWars client for the SEC573 class☆44Updated 3 months ago
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 3 months ago
- Tools for simulating threats☆185Updated last year
- Docker Crash Course: How to containerize your favorite security tools☆28Updated last year
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆28Updated 10 months ago
- VirtualGHOST Detection Tool☆91Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆143Updated this week
- Traps web spiders☆74Updated 4 years ago
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆33Updated last year
- Completely Risky Active-Directory Simulation Hub☆100Updated last year
- ☆74Updated last week
- Python version of Praeda (Praeda-II) a MFP data harvesting tool☆11Updated last month
- Windows Malware Investigation Scripts & Docs☆83Updated 7 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated 2 years ago
- InsightVM helpful SQL queries☆64Updated 3 months ago
- Security Scripts and Sources for daily usage.☆60Updated last month
- ☆41Updated last year
- Creation of a laboratory for malware analysis in AWS☆99Updated 2 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Updated last year
- ☆39Updated 2 years ago
- ☆68Updated 6 months ago
- God Mode Detection Rules☆134Updated 10 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 7 months ago
- Security Operations Chef☆34Updated last week
- My eBook with tips on how to get started in industrial (ICS/OT) cyber security.☆52Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆191Updated 11 months ago