mayhemiclabs / weblabyrinth
A system that creates a bogus web structure to entrap and delay web scanners
☆52Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for weblabyrinth
- automate your MISP installs☆66Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 3 years ago
- ☆77Updated 5 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- A Splunk app to use MISP in background☆109Updated 2 weeks ago
- Powershell - web traffic whitenoise generator☆46Updated 4 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- ☆39Updated 5 years ago
- A Splunk app with saved reports derived from Sigma rules☆72Updated 6 years ago
- ☆53Updated 3 years ago
- Sigma Detection Rule Repository☆85Updated 4 years ago
- Recon Hunt Queries☆75Updated 3 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 3 years ago
- ☆34Updated 3 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- ☆32Updated 11 months ago
- Intrusion Detection Honeypots Book Code☆24Updated 4 years ago
- All my slides for any talks☆23Updated 3 weeks ago
- Tools to automate and/or expedite response.☆113Updated 4 months ago
- Volatility plugins created by the author☆44Updated 9 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆23Updated 5 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 4 years ago
- ☆31Updated 2 weeks ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated last month
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆90Updated 3 years ago
- SEC599 supporting GitHub repository☆15Updated 5 years ago