mrhavens / DockerTrapLinks
A general-purpose, high-interaction honeypot that blends old-school Linux internals with new-school containerization to spawn a new trap for hackers upon connection.
☆27Updated 5 years ago
Alternatives and similar repositories for DockerTrap
Users that are interested in DockerTrap are comparing it to the libraries listed below
Sorting:
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- A server providing RESTful access to CyberChef☆162Updated 9 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Easily create index of your SANS books☆19Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Updated 2 years ago
- ☆44Updated 5 months ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last week
- ☆39Updated 5 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆41Updated 6 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆22Updated 5 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆107Updated 2 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Curated list of awesome, open source data exfiltration tools☆64Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Documentation used for Shuffle☆21Updated this week
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago