secureworks / dcept
A tool for deploying and detecting use of Active Directory honeytokens
☆506Updated 2 years ago
Alternatives and similar repositories for dcept:
Users that are interested in dcept are comparing it to the libraries listed below
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆486Updated 7 years ago
- Incident Response Forensic Framework☆601Updated 5 years ago
- ☆507Updated 4 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆154Updated 9 years ago
- MozDef: The Mozilla Defense Platform☆67Updated 5 years ago
- RWMC is no longer supported. Please use PowerMemory.☆165Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆453Updated last year
- Honeypot deployment made easy☆235Updated 6 years ago
- Remote forensics meta tool☆465Updated last month
- DPS' Lightweight Investigation Notebook☆429Updated last year
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆331Updated 4 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆199Updated 8 years ago
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆215Updated 5 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago
- Laika BOSS: Object Scanning System☆745Updated 4 months ago
- Kvasir: Penetration Test Data Management☆427Updated 6 years ago
- ☆426Updated 7 years ago
- Malicious HTTP traffic explorer☆716Updated 2 years ago
- Currently not updated for WMIEvent module...☆263Updated 9 years ago
- Malcom - Malware Communications Analyzer☆1,161Updated 7 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆129Updated 7 years ago
- Powershell-based Windows Security Auditing Toolbox☆577Updated 6 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated last year
- Machinae Security Intelligence Collector☆512Updated 11 months ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆653Updated 5 years ago