eg-cert / dockpot
☆52Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for dockpot
- Nix Audit made easier (RHEL, CentOS)☆66Updated 3 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 6 years ago
- Deploy MISP Project software with Vagrant.☆42Updated 4 years ago
- ☆139Updated 6 months ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Honeypot (Dionaea and kippo) setup script☆82Updated 8 years ago
- Repo for autosnort scripts.☆156Updated 4 years ago
- Evolving directions on building the best Open Source Forensics VM☆159Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆52Updated 2 weeks ago
- Files vetted, and approved for public release☆53Updated 11 months ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆80Updated 7 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆32Updated 2 months ago
- Core elements of the Modern Honey Network implemented in Docker☆33Updated 2 years ago
- A toolkit for Security Researchers☆124Updated 5 years ago
- Stop searching for sample hashes on 10 different sites.☆65Updated 6 years ago
- pastebin.com Content Monitoring Tool☆193Updated 12 years ago
- Different tools, koen.vanimpe@cudeso.be☆100Updated last month
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Updated last year
- automate your MISP installs☆66Updated 4 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆161Updated 4 years ago
- Harbinger Threat Intelligence☆82Updated 8 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆65Updated last year
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- ☆46Updated 9 years ago
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 5 years ago