adhdproject / honeybadger
☆132Updated 3 years ago
Alternatives and similar repositories for honeybadger:
Users that are interested in honeybadger are comparing it to the libraries listed below
- Tools for simulating threats☆180Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Traps web spiders☆64Updated 4 years ago
- ☆55Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆122Updated 2 weeks ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆55Updated 3 years ago
- The latest pyWars client for the SEC573 class☆43Updated last year
- InsightVM helpful SQL queries☆62Updated last month
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆113Updated 3 months ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆247Updated last year
- Tools to automatically create a SANS index based off the course pdf files.☆84Updated 4 years ago
- Pwnspoof repository☆257Updated last year
- A port of BHIS's Backdoors & Breaches for playingcards.io☆61Updated last year
- ☆73Updated last year
- ☆228Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆32Updated 4 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆274Updated 4 months ago
- Creation of a laboratory for malware analysis in AWS☆90Updated 2 years ago
- an awesome list of active defense resources☆116Updated 4 years ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆74Updated this week
- A GeoIP lookup utility utilizing ipinfo.io services.☆84Updated last year
- Ransomware leak site monitoring☆309Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆143Updated 2 years ago
- A tool designed to hunt for Phishing Kit source code☆217Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- Docker Crash Course: How to containerize your favorite security tools☆27Updated last year
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆76Updated last year