Docker configuration to quickly setup your own Canarytokens.
☆655Apr 1, 2026Updated last month
Alternatives and similar repositories for canarytokens-docker
Users that are interested in canarytokens-docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Canarytokens helps track activity and actions on your network.☆2,062Updated this week
- Modular and decentralised honeypot☆2,866Updated this week
- Collection of useful Canary tools☆95May 13, 2026Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,508Jan 12, 2026Updated 4 months ago
- Detect Tactics, Techniques & Combat Threats☆2,290Apr 29, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Central correlator for opencanary instances☆17Feb 3, 2022Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,959May 12, 2026Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,962Jul 6, 2024Updated last year
- A repository for using osquery for incident detection and response☆894Sep 8, 2025Updated 8 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,176Apr 22, 2026Updated 3 weeks ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- Main Sigma Rule Repository☆10,451May 15, 2026Updated last week
- A repository for using windows event forwarding for incident detection and response☆1,323Sep 8, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆297May 2, 2024Updated 2 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,670Apr 15, 2025Updated last year
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,236Aug 7, 2025Updated 9 months ago
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,147Nov 19, 2024Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,458Updated this week
- ☆333Dec 8, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- Your Everyday Threat Intelligence☆1,982Updated this week
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- An information security preparedness tool to do adversarial simulation.☆1,139Apr 1, 2019Updated 7 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,406May 14, 2026Updated last week
- Collection of tools that reflect the network dimension into Bloodhound's data☆449Oct 19, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆302Mar 19, 2026Updated 2 months ago
- A tool for deploying and detecting use of Active Directory honeytokens☆507Jul 13, 2022Updated 3 years ago
- Sysmon configuration file template with default high-quality event tracing☆5,518Jul 3, 2024Updated last year
- Respounder detects presence of responder in the network.☆324Jun 15, 2019Updated 6 years ago
- Scanning pastebin with yara rules☆1,135Jan 10, 2026Updated 4 months ago
- GRR Rapid Response: remote live forensics for incident response☆5,065May 12, 2026Updated last week
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,660Jun 6, 2024Updated last year