thinkst / canarytokens-docker
Docker configuration to quickly setup your own Canarytokens.
☆619Updated 2 weeks ago
Alternatives and similar repositories for canarytokens-docker:
Users that are interested in canarytokens-docker are comparing it to the libraries listed below
- Canarytokens helps track activity and actions on your network.☆1,833Updated last week
- Simple Bash IOC Scanner☆728Updated 3 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 9 months ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,458Updated last month
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,324Updated last week
- An information security preparedness tool to do adversarial simulation.☆1,121Updated 6 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,017Updated 3 years ago
- Incident Response Methodologies☆1,025Updated 6 years ago
- Your Everyday Threat Intelligence☆1,844Updated this week
- Password spraying using AWS Lambda for IP rotation☆623Updated 2 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆801Updated last year
- Configuration files for the SOF-ELK VM☆1,577Updated 3 weeks ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆277Updated last year
- CLOSE ACCESS DENIAL.☆1,485Updated last week
- Digging Deeper....☆3,204Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆540Updated last year
- DShield Raspberry Pi Sensor☆466Updated 2 weeks ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆706Updated this week
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,268Updated 3 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,449Updated 2 months ago
- ☆1,072Updated 5 years ago
- Re-play Security Events☆1,637Updated last year
- A Powershell incident response framework☆1,598Updated 2 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆500Updated 2 years ago
- Advanced Honeypot framework.☆1,249Updated last year
- Super timeline all the things☆1,828Updated last month
- An informational repo about hunting for adversaries in your IT environment.☆1,767Updated 3 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆478Updated 5 years ago
- Domain Password Audit Tool for Pentesters☆954Updated 2 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,303Updated last year