ciscocsirt / dhpLinks
Simple Docker Honeypot server emulating small snippets of the Docker HTTP API
☆30Updated 4 years ago
Alternatives and similar repositories for dhp
Users that are interested in dhp are comparing it to the libraries listed below
Sorting:
- Yara rules to be used with the Burp Yara-Scanner extension☆48Updated 3 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- ☆51Updated 6 years ago
- Triage automation for suspect URLs☆13Updated 5 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis ” of key information.☆21Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- Mass Triage Tools☆20Updated 4 months ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago