secureworks / dceptLinks
A tool for deploying and detecting use of Active Directory honeytokens
☆509Updated 3 years ago
Alternatives and similar repositories for dcept
Users that are interested in dcept are comparing it to the libraries listed below
Sorting:
- Incident Response Forensic Framework☆607Updated 6 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆489Updated 8 years ago
- ☆519Updated 4 years ago
- Honeypot Intelligence with Splunk☆255Updated 7 years ago
- DPS' Lightweight Investigation Notebook☆434Updated last year
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆200Updated 9 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆660Updated 6 years ago
- Documentation for the GRR Rapid Reponse framework☆308Updated last year
- Sandia Cyber Omni Tracker (SCOT)☆252Updated last year
- Laika BOSS: Object Scanning System☆748Updated last year
- Currently not updated for WMIEvent module...☆263Updated 9 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆152Updated 10 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆335Updated 5 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆471Updated 6 years ago
- RWMC is no longer supported. Please use PowerMemory.☆164Updated 9 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆189Updated last year
- Modular file scanning/analysis framework☆624Updated 6 years ago
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆416Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆831Updated 8 years ago
- Remote forensics meta tool☆474Updated 8 months ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆405Updated 3 years ago
- A Simple QUEry and Report Tool☆142Updated 6 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 8 years ago
- Malicious HTTP traffic explorer☆722Updated 2 years ago
- SIFT Bootstrap Script☆145Updated 8 years ago
- Automated, Collection, and Enrichment Platform☆324Updated 6 years ago
- MozDef: The Mozilla Defense Platform☆68Updated 5 years ago
- Protocol Analysis/Decoder Framework☆496Updated 2 years ago
- A PowerShell TCP/IP swiss army knife.☆570Updated 8 years ago