referefref / honeydet
Signature based honeypot detector tool written in Golang
☆89Updated last week
Alternatives and similar repositories for honeydet:
Users that are interested in honeydet are comparing it to the libraries listed below
- ☆127Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated 10 months ago
- Canary Detection☆164Updated 11 months ago
- Mapping of open-source detection rules and atomic tests.☆155Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 11 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆48Updated last month
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆69Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆147Updated 6 months ago
- ☆87Updated last month
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 2 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆66Updated this week
- A home for detection content developed by the delivr.to team☆67Updated last month
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆121Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆108Updated 2 weeks ago
- Living Off Security Tools☆45Updated 4 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 4 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- MISP Playbooks☆188Updated last month
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated last month
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆76Updated 3 weeks ago
- ShellSweeping the evil.☆163Updated 3 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆32Updated 7 months ago
- Modular web-application honeypot platform built using go and gin☆56Updated 10 months ago