telekom-security / tpotce
π― T-Pot - The All In One Multi Honeypot Platform π
β7,238Updated last week
Alternatives and similar repositories for tpotce:
Users that are interested in tpotce are comparing it to the libraries listed below
- an awesome list of honeypot resourcesβ8,839Updated 5 months ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own inβ¦β3,462Updated this week
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/β5,335Updated this week
- Automated Adversary Emulation Platformβ5,804Updated this week
- A curated list of awesome YARA rules, tools, and people.β3,661Updated 2 months ago
- Open Source Vulnerability Management Platformβ5,166Updated last week
- A curated list of Awesome Threat Intelligence resourcesβ8,369Updated 5 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering envβ¦β6,822Updated this week
- Wiki to collect Red Team infrastructure hardening resourcesβ4,205Updated 9 months ago
- Six Degrees of Domain Adminβ10,012Updated 7 months ago
- Modern Honey Networkβ2,441Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β4,586Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.β10,089Updated this week
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yoβ¦β3,605Updated this week
- Loki - Simple IOC and YARA Scannerβ3,450Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β5,619Updated this week
- Advanced vulnerability scanning with Nmap NSEβ3,538Updated 4 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,242Updated this week
- Main Sigma Rule Repositoryβ8,639Updated last week
- A swiss army knife for pentesting networksβ8,554Updated last year
- β¨ A curated list of awesome threat detection and hunting resources π΅οΈββοΈβ3,981Updated 6 months ago
- Adversary Emulation Frameworkβ8,819Updated this week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandβ¦β7,051Updated 4 months ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platformβ5,488Updated this week
- Impacket is a collection of Python classes for working with network protocols.β13,827Updated this week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ11,166Updated 3 months ago
- Repository of yara rulesβ4,265Updated 9 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more eβ¦β4,094Updated 11 months ago
- TheHive: a Scalable, Open Source and Free Security Incident Response Platformβ3,523Updated 2 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event logβ2,810Updated 7 months ago