adhdproject / spidertrap
Traps web spiders
☆66Updated 4 years ago
Alternatives and similar repositories for spidertrap:
Users that are interested in spidertrap are comparing it to the libraries listed below
- A basic flask based Outlook Web Honey pot☆66Updated last year
- Creation of a laboratory for malware analysis in AWS☆93Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆191Updated last month
- Tools for simulating threats☆181Updated last year
- Pwnspoof repository☆258Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆123Updated 2 weeks ago
- God Mode Detection Rules☆134Updated 6 months ago
- Identify Azure blobs using a wordlist of account name and container name strings☆36Updated 4 years ago
- ☆56Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆68Updated last year
- ☆133Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 2 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- ☆117Updated 10 months ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆11Updated 3 years ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆105Updated 2 weeks ago
- Docker image for Velocidex Velociraptor☆118Updated 7 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆277Updated 5 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆99Updated last year
- Signature based honeypot detector tool written in Golang☆89Updated 2 months ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆56Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆118Updated 2 years ago
- SANS Slingshot Linux Distribution☆45Updated 4 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆242Updated this week
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆57Updated 3 years ago
- ☆51Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Rapidly Search and Hunt through Linux Forensics Artifacts☆189Updated last year
- Automated security lab provisioning☆73Updated this week
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆37Updated 3 years ago