Intrusion Detection Honeypots Book Code
☆28Aug 31, 2020Updated 5 years ago
Alternatives and similar repositories for idh
Users that are interested in idh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Jun 19, 2017Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Nov 21, 2020Updated 5 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated 2 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 7 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- ☆17Aug 24, 2020Updated 5 years ago
- How to install a PCE simplified.☆17Mar 29, 2026Updated 2 weeks ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- ☆104Aug 4, 2025Updated 8 months ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆51Sep 22, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Dec 7, 2022Updated 3 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆75Updated this week
- ☆12Dec 2, 2021Updated 4 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated last year
- Extensible MacOS system telemetry generator.☆56Updated this week
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Ready-made Windows Sandbox launch profiles and scripts that automate the routine☆17Feb 1, 2023Updated 3 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scripts that cover the basics of interacting with the AMP for Endpoints API☆17Feb 22, 2019Updated 7 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 4 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 7 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The Azure Execution Tool☆154Feb 6, 2026Updated 2 months ago
- WAF Testing Tool☆21May 16, 2014Updated 11 years ago
- ☆16Dec 4, 2023Updated 2 years ago
- Defender for Endpoint☆28Mar 28, 2026Updated 2 weeks ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Oct 12, 2020Updated 5 years ago
- A Perl script to run a DNS tunneling server☆26Jun 12, 2010Updated 15 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week