adhdproject / honeyports
a port made of honey for blocking people
☆13Updated 4 years ago
Alternatives and similar repositories for honeyports:
Users that are interested in honeyports are comparing it to the libraries listed below
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Template for building a packet sniffer☆14Updated last year
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- ☆53Updated last week
- ☆11Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- A CALDERA plugin☆26Updated 8 months ago
- Baseline a Windows System against LOLBAS☆26Updated 11 months ago
- Actionable data for Security Operations☆18Updated 3 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 11 months ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Chapter 9: Disseminate☆14Updated 7 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated last week
- Workflows for Shuffle☆21Updated 2 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- Documentation used for Shuffle☆19Updated 2 weeks ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- SANS Slingshot Linux Distribution☆50Updated 4 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 11 months ago
- A system that creates a bogus web structure to entrap and delay web scanners☆59Updated 3 years ago
- Corelight@Home script☆41Updated last year
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 4 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year