kulinacs / cowrie-attackLinks
Mapping the ATT&CK matrix in a Cowrie honeypot
☆16Updated 7 years ago
Alternatives and similar repositories for cowrie-attack
Users that are interested in cowrie-attack are comparing it to the libraries listed below
Sorting:
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆26Updated last year
- Universal Honey Pot☆29Updated 3 weeks ago
- Deploy MISP Project software with Vagrant.☆44Updated 5 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 11 months ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 3 weeks ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- Public rules and samples for various automations through LimaCharlie.io☆13Updated 3 years ago
- Python-based cloud node for local use☆11Updated 7 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Automated Memory Forensic☆34Updated 7 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- ☆52Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago