sjhilt / GasPot
GasPot Released at Blackhat 2015
☆133Updated 4 months ago
Related projects: ⓘ
- Open source tools for realistic-behaving electric grid honeynets☆54Updated 9 years ago
- Moki Distribution - ICS/SCADA Tools☆101Updated 7 years ago
- nse scripts for scada identification☆121Updated 10 years ago
- Differential Analysis of Malware in Memory☆209Updated 7 years ago
- ☆48Updated 5 years ago
- Triconex TriStation utilities and tools☆70Updated 5 years ago
- This is a logon script used to detect the theft of credentials by tools such as Mimikatz☆116Updated 9 years ago
- Sample files for Control Things Platform☆36Updated 5 months ago
- Malware/IOC ingestion and processing engine☆102Updated 5 years ago
- Honeynet Project generic authenticated datafeed protocol☆211Updated 11 months ago
- A warehouse for your malware☆131Updated 11 years ago
- Process HTTP Pcaps With YARA☆99Updated 11 years ago
- ☆200Updated last year
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Updated 5 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆280Updated 6 years ago
- Mass static malware analysis tool☆91Updated 2 years ago
- The Seeker of IOC☆129Updated 3 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆131Updated 4 months ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆61Updated 8 years ago
- Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware☆227Updated 3 years ago
- ☆167Updated 3 years ago
- A powershell script for creating a Windows honeyport.☆87Updated 8 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆192Updated 7 years ago
- Malware Sinkhole List in various formats☆102Updated 2 years ago
- a low-interaction honeypot☆92Updated 7 years ago
- Public Repository of all Publicly Available Packet Captures that I've used or come across☆161Updated 11 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆94Updated 3 months ago
- Detecting Lateral Movement with Machine Learning☆137Updated 6 years ago
- List of default passwords for Industrial Control Systems☆68Updated 7 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆141Updated 4 years ago