thinkst / canarytokensView external linksLinks
Canarytokens helps track activity and actions on your network.
☆2,016Updated this week
Alternatives and similar repositories for canarytokens
Users that are interested in canarytokens are comparing it to the libraries listed below
Sorting:
- Docker configuration to quickly setup your own Canarytokens.☆647Jan 23, 2026Updated 3 weeks ago
- Modular and decentralised honeypot☆2,769Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,570Updated this week
- Main Sigma Rule Repository☆10,109Updated this week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,901Jul 6, 2024Updated last year
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,583Apr 15, 2025Updated 9 months ago
- Six Degrees of Domain Admin☆10,537Aug 1, 2025Updated 6 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,710Sep 23, 2025Updated 4 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Jan 12, 2026Updated last month
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Automated Adversary Emulation Platform☆6,733Updated this week
- an awesome list of honeypot resources☆10,146Apr 1, 2025Updated 10 months ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated 3 weeks ago
- Digging Deeper....☆3,747Feb 5, 2026Updated last week
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,883Jul 25, 2025Updated 6 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,311Dec 6, 2025Updated 2 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,638Jan 5, 2026Updated last month
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,548Nov 24, 2025Updated 2 months ago
- A swiss army knife for pentesting networks☆9,056Dec 6, 2023Updated 2 years ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,123Updated this week
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,618Dec 13, 2025Updated 2 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,633Dec 15, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,440Oct 1, 2025Updated 4 months ago
- 🍯 T-Pot - The All In One Multi Honeypot Platform 🐝☆8,756Jan 29, 2026Updated 2 weeks ago
- Collection of useful Canary tools☆93Jan 29, 2026Updated 2 weeks ago
- The Hunting ELK☆3,913Jun 1, 2024Updated last year
- In-depth attack surface mapping and asset discovery☆14,103Updated this week
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆291Oct 28, 2017Updated 8 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,529Oct 16, 2025Updated 3 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,183Updated this week
- A curated list of Awesome Threat Intelligence resources☆9,741Jan 19, 2026Updated 3 weeks ago
- Multi-Cloud Security Auditing Tool☆7,537Sep 23, 2025Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,448Updated this week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,531Jan 20, 2026Updated 3 weeks ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,049Oct 19, 2025Updated 3 months ago
- Loki - Simple IOC and YARA Scanner☆3,719Jan 12, 2026Updated last month
- Infection Monkey - An open-source adversary emulation platform☆6,944May 1, 2025Updated 9 months ago
- Find, verify, and analyze leaked credentials☆24,487Feb 7, 2026Updated last week
- Re-play Security Events☆1,723Mar 20, 2024Updated last year