secureworks / dceptLinks
A tool for deploying and detecting use of Active Directory honeytokens
☆504Updated 3 years ago
Alternatives and similar repositories for dcept
Users that are interested in dcept are comparing it to the libraries listed below
Sorting:
- Incident Response Forensic Framework☆605Updated 5 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆488Updated 8 years ago
- Honeypot Intelligence with Splunk☆255Updated 7 years ago
- ☆518Updated 4 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆455Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- Documentation for the GRR Rapid Reponse framework☆307Updated last year
- Laika BOSS: Object Scanning System☆749Updated 10 months ago
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆415Updated 2 years ago
- A Simple QUEry and Report Tool☆142Updated 6 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆469Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Updated 7 years ago
- Sandia Cyber Omni Tracker (SCOT)☆251Updated 11 months ago
- MozDef: The Mozilla Defense Platform☆68Updated 5 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆331Updated 5 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆153Updated 10 years ago
- Modular file scanning/analysis framework☆622Updated 6 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆200Updated 8 years ago
- Bro IDS programs collection.☆146Updated 6 years ago
- ☆100Updated 7 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆187Updated last year
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- Malicious HTTP traffic explorer☆721Updated 2 years ago
- Protocol Analysis/Decoder Framework☆496Updated 2 years ago
- A low to medium interaction honeypot.☆472Updated last year
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Updated 6 years ago
- Powershell-based Windows Security Auditing Toolbox☆575Updated 6 years ago
- Currently not updated for WMIEvent module...☆263Updated 9 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 10 years ago