juju4 / ansible-mhn
Modern Honey Network deployment with ansible
☆12Updated 2 years ago
Alternatives and similar repositories for ansible-mhn:
Users that are interested in ansible-mhn are comparing it to the libraries listed below
- Docker Automated Build for Security Testing Tools☆14Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Docker container for datasploit framework☆26Updated 7 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Spam trap management☆23Updated 9 months ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- first commit☆20Updated last year
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 5 months ago
- MISP - Ansible installation script☆22Updated 6 years ago
- Python bindings for Yeti's API☆18Updated last year
- Enrich a host with open source security information☆27Updated 9 years ago
- ☆12Updated 7 years ago
- Metasploit Framework☆26Updated 7 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- scripts to help beginners program in Bro☆20Updated 11 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago