adhdproject / honeybadgerLinks
☆133Updated 4 years ago
Alternatives and similar repositories for honeybadger
Users that are interested in honeybadger are comparing it to the libraries listed below
Sorting:
- Traps web spiders☆76Updated 5 years ago
- Pwnspoof repository☆265Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated 2 weeks ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆117Updated last year
- Tools for simulating threats☆197Updated 2 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆151Updated 4 years ago
- Web application to create indexes for GIAC certification examinations.☆146Updated 2 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆44Updated 8 months ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- ☆63Updated 4 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 5 years ago
- The latest pyWars client for the SEC573 class☆47Updated 8 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆222Updated 3 years ago
- Indexes for SANS Courses and GIAC Certifications☆266Updated last year
- links collected from SOC Core Skills class☆85Updated 4 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated last year
- Docker Crash Course: How to containerize your favorite security tools☆28Updated 2 years ago
- A tool designed to hunt for Phishing Kit source code☆228Updated 2 years ago
- Ransomware leak site monitoring☆316Updated 3 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆156Updated last month
- Tools to automatically create a SANS index based off the course pdf files.☆113Updated 5 years ago
- SANS Slingshot Linux Distribution☆55Updated 5 years ago
- ☆122Updated last year
- Jupyter Notebooks for the Blue Team☆148Updated 8 months ago
- ☆73Updated 2 years ago
- an awesome list of active defense resources☆126Updated 5 years ago