Canarytokens helps track activity and actions on your network.
☆2,062May 18, 2026Updated this week
Alternatives and similar repositories for canarytokens
Users that are interested in canarytokens are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Docker configuration to quickly setup your own Canarytokens.☆655Apr 1, 2026Updated last month
- Modular and decentralised honeypot☆2,866Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,959May 12, 2026Updated last week
- Main Sigma Rule Repository☆10,451May 15, 2026Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,962Jul 6, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Six Degrees of Domain Admin☆10,532Mar 2, 2026Updated 2 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,670Apr 15, 2025Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,508Jan 12, 2026Updated 4 months ago
- Collection of useful Canary tools☆95May 13, 2026Updated last week
- Automated Adversary Emulation Platform☆6,965Updated this week
- an awesome list of honeypot resources☆10,287Apr 1, 2025Updated last year
- Digging Deeper....☆3,959May 15, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python client for the Thinkst Canary API☆20Apr 17, 2026Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,290Apr 29, 2026Updated 3 weeks ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 7 years ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,916Jul 25, 2025Updated 9 months ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆291Oct 28, 2017Updated 8 years ago
- A swiss army knife for pentesting networks☆9,131Dec 6, 2023Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,731Jan 5, 2026Updated 4 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,553May 9, 2026Updated last week
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,570Apr 24, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The Hunting ELK☆3,922Jun 1, 2024Updated last year
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,290May 13, 2026Updated last week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,640Oct 16, 2025Updated 7 months ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- In-depth attack surface mapping and asset discovery☆14,563Apr 17, 2026Updated last month
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,848Apr 13, 2026Updated last month
- Wiki to collect Red Team infrastructure hardening resources☆4,480Oct 1, 2025Updated 7 months ago
- 🍯 T-Pot - The All In One Multi Honeypot Platform 🐝☆9,219Mar 14, 2026Updated 2 months ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,363Apr 4, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A curated list of Awesome Threat Intelligence resources☆10,195Jan 19, 2026Updated 4 months ago
- A tool for deploying and detecting use of Active Directory honeytokens☆507Jul 13, 2022Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,742Updated this week
- Multi-Cloud Security Auditing Tool☆7,669Sep 23, 2025Updated 7 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,638Apr 28, 2026Updated 3 weeks ago
- Infection Monkey - An open-source adversary emulation platform☆6,999May 1, 2025Updated last year
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,290May 14, 2026Updated last week