mrhavens / DockerTrapLinks
A general-purpose, high-interaction honeypot that blends old-school Linux internals with new-school containerization to spawn a new trap for hackers upon connection.
☆27Updated 5 years ago
Alternatives and similar repositories for DockerTrap
Users that are interested in DockerTrap are comparing it to the libraries listed below
Sorting:
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆104Updated this week
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- A server providing RESTful access to CyberChef☆154Updated 6 months ago
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆40Updated 3 months ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Security Assessment Report geNerated Automatically☆41Updated 11 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 6 months ago
- URL fingerprinting made easy☆89Updated last year
- ☆80Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Updated 8 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- ☆28Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 3 weeks ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 5 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Virtual Security Operations Center☆51Updated 2 years ago
- Wrap any binary into a cached webserver☆54Updated 3 years ago
- ☆44Updated last month
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆46Updated last year