kulinacs / cowrie-attack
Mapping the ATT&CK matrix in a Cowrie honeypot
☆16Updated 6 years ago
Alternatives and similar repositories for cowrie-attack:
Users that are interested in cowrie-attack are comparing it to the libraries listed below
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Public rules and samples for various automations through LimaCharlie.io☆11Updated 3 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Historical Observations of Actionable Reputation Data☆13Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- ☆16Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆11Updated 4 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Python-based cloud node for local use☆11Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- ☆12Updated 7 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- ☆25Updated 3 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆57Updated 6 months ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago