hackertarget / pcap-did-whatLinks
Analyze pcaps with Zeek and a Grafana Dashboard
☆187Updated last year
Alternatives and similar repositories for pcap-did-what
Users that are interested in pcap-did-what are comparing it to the libraries listed below
Sorting:
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last month
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆182Updated last week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆184Updated 10 months ago
- Dredging up secrets from the depths of the file system☆131Updated last year
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆190Updated 8 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 5 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 7 months ago
- Signature based honeypot detector tool written in Golang☆107Updated 8 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated last month
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- Canary Detection☆188Updated last month
- God Mode Detection Rules☆134Updated last year
- A tool for mapping cyber crime☆223Updated 7 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 10 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆179Updated 6 months ago
- VirtualGHOST Detection Tool☆100Updated last week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆152Updated last week
- Knowledge base on cybercriminal concealment techniques☆80Updated 7 months ago
- ☆56Updated 10 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆106Updated 11 months ago
- Traps web spiders☆76Updated 5 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆145Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.☆132Updated 7 months ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆229Updated 5 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Updated last year
- NTP Exfiltration Tool☆148Updated 2 years ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆181Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆434Updated this week