guardicore / labs_campaignsLinks
☆355Updated 3 years ago
Alternatives and similar repositories for labs_campaigns
Users that are interested in labs_campaigns are comparing it to the libraries listed below
Sorting:
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆543Updated 7 months ago
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Super Next generation Advanced Reactive honEypot☆474Updated last year
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 4 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 5 years ago
- AI-based, context-driven network device ranking☆302Updated last year
- ☆100Updated 4 years ago
- SunBurst DGA Decode Script☆205Updated 4 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆272Updated 4 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆442Updated 4 years ago
- CommunityHoneyNetwork Server☆41Updated 2 years ago
- Cross-platform Yara scanner written in Go☆327Updated 2 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆676Updated 2 years ago
- He who flays the hide☆229Updated last year
- DejaVU - Open Source Deception Framework☆422Updated 4 months ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆297Updated last year
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- Files vetted, and approved for public release☆55Updated 2 years ago
- Remote forensics meta tool☆474Updated 8 months ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆154Updated last year
- Cowrie Docker GitHub repository☆81Updated 4 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- a network packet capture compiler☆205Updated 3 years ago
- Elasticsearch for Offensive Security☆141Updated 5 years ago
- Sguil client for NSM☆222Updated last year
- A network packet forensics tool for SSH☆253Updated 4 years ago
- DShield Raspberry Pi Sensor☆500Updated last month
- psad: Intrusion Detection and Log Analysis with iptables☆416Updated 2 years ago