Canarytokens helps track activity and actions on your network.
☆2,044Apr 7, 2026Updated this week
Alternatives and similar repositories for canarytokens
Users that are interested in canarytokens are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Docker configuration to quickly setup your own Canarytokens.☆652Apr 1, 2026Updated last week
- Modular and decentralised honeypot☆2,826Mar 30, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week
- Main Sigma Rule Repository☆10,279Apr 1, 2026Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,939Jul 6, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Six Degrees of Domain Admin☆10,534Mar 2, 2026Updated last month
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 3 months ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,646Apr 15, 2025Updated 11 months ago
- Automated Adversary Emulation Platform☆6,886Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Jan 12, 2026Updated 2 months ago
- an awesome list of honeypot resources☆10,252Apr 1, 2025Updated last year
- Digging Deeper....☆3,889Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,275Jan 21, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 7 years ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,896Jul 25, 2025Updated 8 months ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,679Jan 5, 2026Updated 3 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,434Mar 16, 2026Updated 3 weeks ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,561Apr 3, 2026Updated last week
- The Hunting ELK☆3,911Jun 1, 2024Updated last year
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,560Oct 16, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,329Dec 15, 2024Updated last year
- In-depth attack surface mapping and asset discovery☆14,353Apr 1, 2026Updated last week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,221Apr 4, 2026Updated last week
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,467Oct 1, 2025Updated 6 months ago
- 🍯 T-Pot - The All In One Multi Honeypot Platform 🐝☆9,037Mar 14, 2026Updated 3 weeks ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,361Apr 4, 2024Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆10,041Jan 19, 2026Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,608Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A tool for deploying and detecting use of Active Directory honeytokens☆508Jul 13, 2022Updated 3 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,626Dec 13, 2025Updated 3 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,980May 1, 2025Updated 11 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,232Updated this week
- Multi-Cloud Security Auditing Tool☆7,609Sep 23, 2025Updated 6 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,533Apr 17, 2025Updated 11 months ago
- ☆2,396Oct 14, 2023Updated 2 years ago