secureworks / dceptLinks
A tool for deploying and detecting use of Active Directory honeytokens
☆507Updated 3 years ago
Alternatives and similar repositories for dcept
Users that are interested in dcept are comparing it to the libraries listed below
Sorting:
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆488Updated 8 years ago
- Incident Response Forensic Framework☆606Updated 6 years ago
- ☆519Updated 4 years ago
- Honeypot Intelligence with Splunk☆255Updated 7 years ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- Laika BOSS: Object Scanning System☆749Updated 11 months ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆455Updated 2 years ago
- Currently not updated for WMIEvent module...☆263Updated 9 years ago
- RWMC is no longer supported. Please use PowerMemory.☆164Updated 9 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆469Updated 6 years ago
- MozDef: The Mozilla Defense Platform☆68Updated 5 years ago
- Documentation for the GRR Rapid Reponse framework☆307Updated last year
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆944Updated 4 years ago
- Powershell-based Windows Security Auditing Toolbox☆575Updated 6 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Updated 6 years ago
- Sandia Cyber Omni Tracker (SCOT)☆251Updated last year
- Remote forensics meta tool☆474Updated 8 months ago
- Modular file scanning/analysis framework☆624Updated 6 years ago
- Bro IDS programs collection.☆146Updated 6 years ago
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆416Updated 2 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆333Updated 5 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆200Updated 8 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆153Updated 10 years ago
- A tool to retrieve malware directly from the source for security researchers.☆564Updated 8 years ago
- Malicious HTTP traffic explorer☆723Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆829Updated 8 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆657Updated 6 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆628Updated last year
- CRITs - Collaborative Research Into Threats☆906Updated 6 years ago