Docker configuration to quickly setup your own Canarytokens.
☆649Feb 27, 2026Updated last week
Alternatives and similar repositories for canarytokens-docker
Users that are interested in canarytokens-docker are comparing it to the libraries listed below
Sorting:
- Canarytokens helps track activity and actions on your network.☆2,031Updated this week
- Linux file read monitor☆92Sep 16, 2023Updated 2 years ago
- Modular and decentralised honeypot☆2,786Feb 11, 2026Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Jan 12, 2026Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,264Jan 21, 2026Updated last month
- Central correlator for opencanary instances☆17Feb 3, 2022Updated 4 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,908Jul 6, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,492Jan 12, 2026Updated last month
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292May 2, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,632Updated this week
- A repository for using windows event forwarding for incident detection and response☆1,299Sep 8, 2025Updated 5 months ago
- ☆332Dec 8, 2022Updated 3 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,136Oct 19, 2025Updated 4 months ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,606Apr 15, 2025Updated 10 months ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,137Apr 1, 2019Updated 6 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,213Aug 7, 2025Updated 7 months ago
- Main Sigma Rule Repository☆10,156Updated this week
- A collection of Red Team focused tools, scripts, and notes☆1,145Nov 19, 2024Updated last year
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆730Jan 21, 2020Updated 6 years ago
- Scanning pastebin with yara rules☆1,127Jan 10, 2026Updated last month
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- A repository for using osquery for incident detection and response☆880Sep 8, 2025Updated 5 months ago
- Random Tools☆850Oct 20, 2022Updated 3 years ago
- Re-play Security Events☆1,725Mar 20, 2024Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,344Feb 19, 2026Updated 2 weeks ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,714Sep 23, 2025Updated 5 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,361Jan 26, 2026Updated last month
- A collaborative, multi-platform, red teaming framework☆4,333Feb 19, 2026Updated 2 weeks ago
- Documentation and scripts to properly enable Windows event logs.☆672Oct 3, 2025Updated 5 months ago
- Your Everyday Threat Intelligence☆1,954Feb 12, 2026Updated 3 weeks ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,643Jun 6, 2024Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,549Feb 10, 2026Updated 3 weeks ago