Canarytokens helps track activity and actions on your network.
☆2,031Mar 4, 2026Updated this week
Alternatives and similar repositories for canarytokens
Users that are interested in canarytokens are comparing it to the libraries listed below
Sorting:
- Docker configuration to quickly setup your own Canarytokens.☆649Feb 27, 2026Updated last week
- Modular and decentralised honeypot☆2,786Feb 11, 2026Updated 3 weeks ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,632Updated this week
- Linux file read monitor☆92Sep 16, 2023Updated 2 years ago
- Main Sigma Rule Repository☆10,156Updated this week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,908Jul 6, 2024Updated last year
- Six Degrees of Domain Admin☆10,540Aug 1, 2025Updated 7 months ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,606Apr 15, 2025Updated 10 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,714Sep 23, 2025Updated 5 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Jan 12, 2026Updated last month
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,492Jan 12, 2026Updated last month
- Automated Adversary Emulation Platform☆6,781Feb 28, 2026Updated last week
- an awesome list of honeypot resources☆10,177Apr 1, 2025Updated 11 months ago
- Detect Tactics, Techniques & Combat Threats☆2,264Jan 21, 2026Updated last month
- Digging Deeper....☆3,784Feb 28, 2026Updated last week
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,891Jul 25, 2025Updated 7 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,358Dec 6, 2025Updated 3 months ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,549Feb 10, 2026Updated 3 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,655Jan 5, 2026Updated 2 months ago
- A swiss army knife for pentesting networks☆9,086Dec 6, 2023Updated 2 years ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,150Feb 27, 2026Updated last week
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,623Dec 13, 2025Updated 2 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,832Dec 15, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,450Oct 1, 2025Updated 5 months ago
- Collection of useful Canary tools☆93Updated this week
- 🍯 T-Pot - The All In One Multi Honeypot Platform 🐝☆8,819Jan 29, 2026Updated last month
- The Hunting ELK☆3,912Jun 1, 2024Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- In-depth attack surface mapping and asset discovery☆14,193Updated this week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,529Oct 16, 2025Updated 4 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,208Updated this week
- A curated list of Awesome Threat Intelligence resources☆9,847Jan 19, 2026Updated last month
- Multi-Cloud Security Auditing Tool☆7,562Sep 23, 2025Updated 5 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,515Updated this week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,136Oct 19, 2025Updated 4 months ago
- Loki - Simple IOC and YARA Scanner☆3,729Jan 12, 2026Updated last month
- Infection Monkey - An open-source adversary emulation platform☆6,963May 1, 2025Updated 10 months ago
- Find, verify, and analyze leaked credentials☆24,779Feb 28, 2026Updated last week