secureworks / dceptLinks
A tool for deploying and detecting use of Active Directory honeytokens
☆507Updated 3 years ago
Alternatives and similar repositories for dcept
Users that are interested in dcept are comparing it to the libraries listed below
Sorting:
- Incident Response Forensic Framework☆603Updated 5 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆487Updated 8 years ago
- ☆512Updated 4 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Documentation for the GRR Rapid Reponse framework☆305Updated 10 months ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- Laika BOSS: Object Scanning System☆748Updated 7 months ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆200Updated 8 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆455Updated 2 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆153Updated 10 years ago
- Sandia Cyber Omni Tracker (SCOT)☆249Updated 9 months ago
- RWMC is no longer supported. Please use PowerMemory.☆164Updated 9 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆413Updated 2 years ago
- Currently not updated for WMIEvent module...☆261Updated 9 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆468Updated 5 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆330Updated 4 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆469Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆829Updated 7 years ago
- Protocol Analysis/Decoder Framework☆494Updated 2 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Updated last year
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- MozDef: The Mozilla Defense Platform☆68Updated 5 years ago
- ☆100Updated 6 years ago
- ☆306Updated 8 years ago
- Powershell-based Windows Security Auditing Toolbox☆575Updated 6 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆187Updated last year
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Updated 7 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago