joda32 / owa-honeypot
A basic flask based Outlook Web Honey pot
☆65Updated 2 years ago
Alternatives and similar repositories for owa-honeypot
Users that are interested in owa-honeypot are comparing it to the libraries listed below
Sorting:
- Traps web spiders☆72Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆223Updated 7 months ago
- ☆35Updated 5 months ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆164Updated 7 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆70Updated 5 months ago
- Docker container for the gophish phishing framework.☆51Updated last month
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆151Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 4 months ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆57Updated 10 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Completely Risky Active-Directory Simulation Hub☆100Updated last year
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated last month
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆57Updated this week
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated last year
- A list of resources to build a information security team.☆13Updated 4 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- ☆164Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆88Updated 9 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated last year
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆103Updated 2 months ago
- Helpful tools for interacting with a GoPhish phishing instance☆45Updated 3 weeks ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- A powershell script for creating a Windows honeyport.☆11Updated 9 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 5 months ago
- Python API for interacting with sigma rules.☆56Updated 2 years ago