kulinacs / cowrie-attackLinks
Mapping the ATT&CK matrix in a Cowrie honeypot
☆16Updated 7 years ago
Alternatives and similar repositories for cowrie-attack
Users that are interested in cowrie-attack are comparing it to the libraries listed below
Sorting:
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆32Updated 5 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Updated 2 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Universal Honey Pot☆29Updated 3 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- ☆14Updated 7 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- ☆52Updated 7 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- Public rules and samples for various automations through LimaCharlie.io☆13Updated 3 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- ☆13Updated 6 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago