telekom-security / tpotceLinks
π― T-Pot - The All In One Multi Honeypot Platform π
β8,129Updated last month
Alternatives and similar repositories for tpotce
Users that are interested in tpotce are comparing it to the libraries listed below
Sorting:
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own inβ¦β3,849Updated this week
- an awesome list of honeypot resourcesβ9,512Updated 4 months ago
- Modular and decentralised honeypotβ2,545Updated 2 months ago
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/β5,746Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.β10,829Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,803Updated 2 weeks ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yoβ¦β3,774Updated 2 weeks ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering envβ¦β7,565Updated this week
- Open Source Vulnerability Management Platformβ5,868Updated last week
- Automated Adversary Emulation Platformβ6,326Updated last week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandβ¦β7,302Updated 10 months ago
- Adversary Emulation Frameworkβ9,754Updated 2 weeks ago
- Digging Deeper....β3,374Updated this week
- Six Degrees of Domain Adminβ10,280Updated last week
- Canarytokens helps track activity and actions on your network.β1,879Updated this week
- Malicious traffic detection systemβ7,113Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β5,949Updated 2 months ago
- Attack Surface Management Platformβ8,922Updated 2 months ago
- Loki - Simple IOC and YARA Scannerβ3,602Updated 8 months ago
- A curated list of Awesome Threat Intelligence resourcesβ9,065Updated 2 months ago
- Modern Honey Networkβ2,462Updated 8 months ago
- A curated list of awesome YARA rules, tools, and people.β3,895Updated 4 months ago
- The Hunting ELKβ3,869Updated last year
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.β7,036Updated this week
- TheHive: a Scalable, Open Source and Free Security Incident Response Platformβ3,782Updated 2 weeks ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonationβ5,286Updated 3 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event logβ2,961Updated last year
- Automate the creation of a lab environment complete with security tooling and logging best practicesβ4,814Updated last year
- Impacket is a collection of Python classes for working with network protocols.β14,649Updated last week
- A Suricata based IDS/IPS/NSM distroβ1,554Updated 11 months ago