mrhavens / DockerTrap
A general-purpose, high-interaction honeypot that blends old-school Linux internals with new-school containerization to spawn a new trap for hackers upon connection.
☆26Updated 4 years ago
Alternatives and similar repositories for DockerTrap:
Users that are interested in DockerTrap are comparing it to the libraries listed below
- Python API for interacting with sigma rules.☆49Updated 2 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- Maltego transform for visualizing Nessus scan data☆46Updated 5 years ago
- ☆41Updated 9 months ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆69Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- ☆79Updated last year
- Bloodhound Portable for Windows☆51Updated last year
- A home for detection content developed by the delivr.to team☆64Updated last week
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated last week
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆47Updated 2 years ago
- Corelight@Home script☆40Updated last year
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Python command line tool used for generating GIAC Certification indexes.☆25Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆57Updated 3 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆107Updated 2 years ago
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- Simple parser to get useful information from AWS S3 logs☆24Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Security tools report parsers for Faradaysec.com☆51Updated 3 weeks ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 9 months ago
- Data Driven Threat Hunting on the RaspberryPi☆29Updated 3 years ago