telekom-security / tpotceLinks
π― T-Pot - The All In One Multi Honeypot Platform π
β7,896Updated last week
Alternatives and similar repositories for tpotce
Users that are interested in tpotce are comparing it to the libraries listed below
Sorting:
- Adversary Emulation Frameworkβ9,404Updated last week
- an awesome list of honeypot resourcesβ9,364Updated 2 months ago
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/β5,566Updated this week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own inβ¦β3,712Updated last week
- Open Source Vulnerability Management Platformβ5,415Updated last week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,600Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering envβ¦β7,316Updated 2 weeks ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yoβ¦β3,714Updated this week
- Six Degrees of Domain Adminβ10,187Updated 2 weeks ago
- Automated Adversary Emulation Platformβ6,155Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β9,534Updated last month
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandβ¦β7,229Updated 8 months ago
- Empire is a PowerShell and Python post-exploitation agent.β7,621Updated 5 years ago
- Malicious traffic detection systemβ6,981Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.β9,215Updated last year
- A swiss army knife for pentesting networksβ8,745Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.β10,598Updated last week
- Loki - Simple IOC and YARA Scannerβ3,543Updated 6 months ago
- In-depth attack surface mapping and asset discoveryβ13,027Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β5,835Updated last week
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonationβ5,167Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β4,676Updated 4 years ago
- Advanced vulnerability scanning with Nmap NSEβ3,617Updated 8 months ago
- Impacket is a collection of Python classes for working with network protocols.β14,352Updated this week
- Wiki to collect Red Team infrastructure hardening resourcesβ4,272Updated last year
- Repository of yara rulesβ4,406Updated last year
- Attack Surface Management Platformβ8,777Updated this week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.β5,241Updated last month
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,372Updated last year
- Web application fuzzerβ6,186Updated 9 months ago