Intrusion Detection Honeypots Book Code
☆28Aug 31, 2020Updated 5 years ago
Alternatives and similar repositories for idh
Users that are interested in idh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Chapter 9: Disseminate☆16Sep 6, 2017Updated 8 years ago
- ☆15Aug 20, 2019Updated 6 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Nov 21, 2020Updated 5 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Feb 19, 2018Updated 8 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- Expired FUD .exe crypter☆12Aug 21, 2016Updated 9 years ago
- ☆13Jan 15, 2017Updated 9 years ago
- Sophos UTM 9 REST API Client in Golang☆12May 6, 2022Updated 3 years ago
- Cookiecutter template for new Ansible projects☆12Jul 14, 2017Updated 8 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- ☆11Mar 9, 2018Updated 8 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Extensible MacOS system telemetry generator.☆55Mar 1, 2026Updated 3 weeks ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Open-source, enterprise-grade threat modeling platform☆32Updated this week
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- Chatbot that allows users to communicate directly with Ansible AWX/Tower from various chat platforms.☆13Sep 7, 2023Updated 2 years ago
- Demo artifacts to go along with Kafka in Jail with Strimzi presentation☆13Jun 12, 2019Updated 6 years ago
- Scripts that cover the basics of interacting with the AMP for Endpoints API☆17Feb 22, 2019Updated 7 years ago
- ☆12Oct 24, 2022Updated 3 years ago
- ☆18Jan 18, 2022Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- ☆11Apr 25, 2024Updated last year
- Read-only mirror of https://gitlab.gnome.org/GNOME/gcr☆12Feb 27, 2026Updated 3 weeks ago
- ☆12Jan 5, 2021Updated 5 years ago
- KiCON Template for PCB OPS with Gitlab-ci☆11Apr 29, 2019Updated 6 years ago
- WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middlew…☆33Apr 25, 2020Updated 5 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- This role will install a number of security auditing and monitoring tools for Linux servers.☆12Apr 5, 2022Updated 3 years ago
- Terraform Provider for Illumio Core☆14Oct 14, 2025Updated 5 months ago