kulinacs / cowrie-attack
Mapping the ATT&CK matrix in a Cowrie honeypot
☆16Updated 6 years ago
Alternatives and similar repositories for cowrie-attack
Users that are interested in cowrie-attack are comparing it to the libraries listed below
Sorting:
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Public rules and samples for various automations through LimaCharlie.io☆12Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- ☆14Updated 6 years ago
- Historical Observations of Actionable Reputation Data☆13Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Python-based cloud node for local use☆11Updated 7 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- ☆16Updated 7 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Scan blob files for sensitive content☆11Updated 3 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Some rules, scripts of some use to us☆9Updated 6 months ago
- ☆25Updated 4 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago