telekom-security / tpotce
π― T-Pot - The All In One Multi Honeypot Platform π
β7,356Updated this week
Alternatives and similar repositories for tpotce:
Users that are interested in tpotce are comparing it to the libraries listed below
- an awesome list of honeypot resourcesβ8,901Updated 5 months ago
- Adversary Emulation Frameworkβ8,889Updated this week
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/β5,353Updated this week
- Automated Adversary Emulation Platformβ5,847Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β5,647Updated 2 weeks ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yoβ¦β3,624Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering envβ¦β6,898Updated this week
- Six Degrees of Domain Adminβ10,034Updated this week
- Modular and decentralised honeypotβ2,400Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.β13,866Updated last week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β4,373Updated last month
- A swiss army knife for pentesting networksβ8,574Updated last year
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own inβ¦β3,524Updated this week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandβ¦β7,075Updated 4 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,271Updated 2 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β4,600Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,188Updated last year
- Linux privilege escalation auditing toolβ5,791Updated 11 months ago
- A curated list of tools for incident responseβ7,890Updated 6 months ago
- Monitor linux processes without root permissionsβ5,099Updated 2 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log managementβ3,083Updated 3 years ago
- Modern Honey Networkβ2,444Updated 2 months ago
- The ultimate WinRM shell for hacking/pentestingβ4,714Updated 2 months ago
- A Suricata based IDS/IPS/NSM distroβ1,507Updated 6 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.β5,153Updated 3 months ago
- Network Analysis Toolβ3,180Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.β10,160Updated this week
- Open Source Vulnerability Management Platformβ5,191Updated 2 weeks ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.β5,224Updated 4 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.β8,982Updated 9 months ago