adhdproject / honeyportsLinks
a port made of honey for blocking people
☆13Updated 5 years ago
Alternatives and similar repositories for honeyports
Users that are interested in honeyports are comparing it to the libraries listed below
Sorting:
- Template for building a packet sniffer☆14Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆76Updated 2 weeks ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- SANS Slingshot Linux Distribution☆54Updated 4 years ago
- an awesome list of active defense resources☆126Updated 5 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 3 months ago
- A system that creates a bogus web structure to entrap and delay web scanners☆65Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- ☆77Updated 3 weeks ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆95Updated 4 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 9 months ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Python command line tool used for generating GIAC Certification indexes.☆27Updated 2 years ago
- Traps web spiders☆76Updated 5 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆185Updated 2 months ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Updated 8 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Falcon Integration Gateway (FIG)☆21Updated last week
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Search a filesystem for indicators of compromise (IoC).☆81Updated 2 weeks ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Defensive Origins Training Schedule☆39Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆72Updated 5 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- ☆60Updated this week
- Curated list of awesome, open source data exfiltration tools☆62Updated 4 years ago