hackertarget / pcap-did-whatLinks
Analyze pcaps with Zeek and a Grafana Dashboard
☆189Updated last year
Alternatives and similar repositories for pcap-did-what
Users that are interested in pcap-did-what are comparing it to the libraries listed below
Sorting:
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆190Updated 2 weeks ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆55Updated 2 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Updated 11 months ago
- Dredging up secrets from the depths of the file system☆131Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆272Updated 7 months ago
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆191Updated 9 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆156Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- God Mode Detection Rules☆135Updated last year
- A tool for mapping cyber crime☆235Updated last week
- Repo to hold wazuh manager mcp server☆71Updated 3 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated last year
- Signature based honeypot detector tool written in Golang☆107Updated 9 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆60Updated 8 months ago
- A repository of credential stealer formats☆238Updated 7 months ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆163Updated last week
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆143Updated last year
- ☆56Updated 11 months ago
- NTP Exfiltration Tool☆147Updated 2 years ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆232Updated 6 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systems☆144Updated last year
- ☆74Updated last week
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- An index of publicly available and open-source threat detection rulesets.☆130Updated 9 months ago
- Canary Detection☆186Updated 3 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆81Updated 5 months ago