secureworks / dceptLinks
A tool for deploying and detecting use of Active Directory honeytokens
☆506Updated 3 years ago
Alternatives and similar repositories for dcept
Users that are interested in dcept are comparing it to the libraries listed below
Sorting:
- Incident Response Forensic Framework☆603Updated 5 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆488Updated 8 years ago
- Honeypot Intelligence with Splunk☆255Updated 6 years ago
- ☆516Updated 4 years ago
- Documentation for the GRR Rapid Reponse framework☆308Updated 11 months ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- MozDef: The Mozilla Defense Platform☆68Updated 5 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆200Updated 8 years ago
- Currently not updated for WMIEvent module...☆262Updated 9 years ago
- Sandia Cyber Omni Tracker (SCOT)☆250Updated 9 months ago
- Remote forensics meta tool☆470Updated 5 months ago
- Laika BOSS: Object Scanning System☆749Updated 8 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆330Updated 4 years ago
- A low to medium interaction honeypot.☆469Updated last year
- Protocol Analysis/Decoder Framework☆494Updated 2 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆153Updated 10 years ago
- Powershell-based Windows Security Auditing Toolbox☆575Updated 6 years ago
- Modular file scanning/analysis framework☆620Updated 5 years ago
- Kvasir: Penetration Test Data Management☆430Updated 6 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆469Updated 6 years ago
- ☆306Updated 8 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 8 years ago
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆215Updated 5 years ago
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- Malicious HTTP traffic explorer☆720Updated 2 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆948Updated 4 years ago
- Bro IDS programs collection.☆146Updated 5 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆467Updated 5 years ago