thinkst / canarytokens-dockerLinks
Docker configuration to quickly setup your own Canarytokens.
☆640Updated last month
Alternatives and similar repositories for canarytokens-docker
Users that are interested in canarytokens-docker are comparing it to the libraries listed below
Sorting:
- Canarytokens helps track activity and actions on your network.☆2,007Updated this week
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,037Updated 4 years ago
- DShield Raspberry Pi Sensor☆506Updated 2 months ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆748Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆544Updated 8 months ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,029Updated 5 years ago
- Simple Bash IOC Scanner☆772Updated 3 years ago
- An information security preparedness tool to do adversarial simulation.☆1,140Updated 6 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆301Updated 2 years ago
- Create actionable data from your Vulnerability Scans☆1,394Updated 3 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆657Updated 3 weeks ago
- Incident Response Methodologies☆1,026Updated 7 years ago
- E-Mail Header Analyzer☆697Updated 2 years ago
- Logging Made Easy☆709Updated 2 years ago
- Online hash checker for Virustotal and other services☆841Updated 9 months ago
- CLOSE ACCESS DENIAL.☆1,537Updated last week
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆491Updated 6 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,541Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated this week
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆505Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆616Updated 3 months ago
- Password spraying using AWS Lambda for IP rotation☆655Updated 2 years ago
- A repository for using osquery for incident detection and response☆877Updated 4 months ago
- Your Everyday Threat Intelligence☆1,943Updated 2 months ago
- MISP Docker (XME edition)☆283Updated 2 years ago
- Configuration files for the SOF-ELK VM☆1,709Updated last week
- Data exfiltration over DNS request covert channel☆881Updated last year
- AI-based, context-driven network device ranking☆302Updated last year
- USB key cleaner☆476Updated 2 years ago
- PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform☆638Updated this week