Intrusion Detection Honeypots Book Code
☆28Aug 31, 2020Updated 5 years ago
Alternatives and similar repositories for idh
Users that are interested in idh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Chapter 9: Disseminate☆16Sep 6, 2017Updated 8 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Jun 19, 2017Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Feb 19, 2018Updated 8 years ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- MICROS Honeypot is a low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality …☆17Sep 25, 2018Updated 7 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 7 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- ☆12Jul 29, 2025Updated 9 months ago
- Expired FUD .exe crypter☆12Aug 21, 2016Updated 9 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆16Feb 16, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Sophos UTM 9 REST API Client in Golang☆12May 6, 2022Updated 3 years ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆51Sep 22, 2025Updated 7 months ago
- ☆15Dec 7, 2022Updated 3 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- ☆11Mar 9, 2018Updated 8 years ago
- The backbone for message-driven applications.☆11Sep 11, 2021Updated 4 years ago
- Extensible MacOS system telemetry generator.☆56Apr 12, 2026Updated 3 weeks ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- ☆15Sep 26, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- Ready-made Windows Sandbox launch profiles and scripts that automate the routine☆17Feb 1, 2023Updated 3 years ago
- Demo artifacts to go along with Kafka in Jail with Strimzi presentation☆13Jun 12, 2019Updated 6 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 6 months ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Push your Sophos UTM log's in your ElasticSearch after a grokking it with Logstash☆12Jul 24, 2019Updated 6 years ago
- ☆12Oct 24, 2022Updated 3 years ago
- Scripts that cover the basics of interacting with the AMP for Endpoints API☆17Feb 22, 2019Updated 7 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Track torrent downloads☆14Dec 9, 2022Updated 3 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆104Feb 25, 2026Updated 2 months ago
- ☆11Apr 25, 2024Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago