mrhavens / DockerTrapLinks
A general-purpose, high-interaction honeypot that blends old-school Linux internals with new-school containerization to spawn a new trap for hackers upon connection.
☆27Updated 5 years ago
Alternatives and similar repositories for DockerTrap
Users that are interested in DockerTrap are comparing it to the libraries listed below
Sorting:
- Python API for interacting with sigma rules.☆54Updated 3 years ago
 - High signal information security sources Goggle.☆67Updated 2 years ago
 - Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
 - A server providing RESTful access to CyberChef☆159Updated 8 months ago
 - Wrap any binary into a cached webserver☆56Updated 3 years ago
 - Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
 - GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆106Updated 3 weeks ago
 - CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
 - A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆40Updated 4 months ago
 - Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
 - ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
 - PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
 - Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
 - This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
 - Integrated web scraper and email account data breach comparison tool☆78Updated last year
 - Python command line tool used for generating GIAC Certification indexes.☆27Updated 2 years ago
 - A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
 - Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 4 years ago
 - Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆56Updated 2 years ago
 - Python utility to generate filesystem content for Obsidian.☆86Updated 2 years ago
 - ☆50Updated 3 months ago
 - Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
 - A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
 - BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
 - A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 years ago
 - An experimental Velociraptor implementation using cloud infrastructure☆26Updated last week
 - Curated list of awesome, open source data exfiltration tools☆62Updated 4 years ago
 - Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 6 months ago
 - Corelight@Home script☆44Updated 2 years ago
 - Windows Security Logging☆43Updated 3 years ago