telekom-security / watchtowerLinks
Watchtower, monitoring your Slack workspaces.
☆16Updated 4 years ago
Alternatives and similar repositories for watchtower
Users that are interested in watchtower are comparing it to the libraries listed below
Sorting:
- ☆29Updated this week
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆16Updated 2 weeks ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- ☆21Updated 2 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- recon-ng modules for Censys☆37Updated last year
- A repository to share contributions related to TheHive Project☆22Updated 3 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Website crawler with YARA detection☆88Updated last year
- Best practices in threat intelligence☆47Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- CLI tools using Harpoon features☆21Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated last year
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- A curated threat modeling library collection☆22Updated last year