lawndoc / RespotterLinks
Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.
β197Updated last month
Alternatives and similar repositories for Respotter
Users that are interested in Respotter are comparing it to the libraries listed below
Sorting:
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β81Updated 8 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data β¦β150Updated 4 months ago
- β74Updated this week
- Completely Risky Active-Directory Simulation Hubβ102Updated 2 years ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you comβ¦β180Updated 6 months ago
- A collection of CVEs weaponized by ransomware operatorsβ128Updated 2 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. Tβ¦β141Updated last week
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory Cβ¦β258Updated 2 years ago
- An ADCS honeypot to catch attackers in your internal network.β319Updated last year
- God Mode Detection Rulesβ134Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.β194Updated 10 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β105Updated 2 years ago
- An open-source self-hosted purple team management web application.β295Updated last week
- A repository of credential stealer formatsβ235Updated 6 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β150Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logsβ123Updated 2 years ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.β185Updated 2 weeks ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.β204Updated last year
- Living Off Security Toolsβ58Updated last month
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cβ¦β166Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesβ127Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04β116Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.orgβ123Updated 3 years ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. β¦β110Updated 5 months ago
- β28Updated 2 years ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilitiesβ270Updated 8 months ago
- Canary Detectionβ186Updated 2 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkitβ116Updated last year
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.β133Updated this week