Docker configuration to quickly setup your own Canarytokens.
☆652Apr 1, 2026Updated last week
Alternatives and similar repositories for canarytokens-docker
Users that are interested in canarytokens-docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Canarytokens helps track activity and actions on your network.☆2,044Updated this week
- Modular and decentralised honeypot☆2,826Mar 30, 2026Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Jan 12, 2026Updated 2 months ago
- Detect Tactics, Techniques & Combat Threats☆2,275Jan 21, 2026Updated 2 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,939Jul 6, 2024Updated last year
- A repository for using osquery for incident detection and response☆888Sep 8, 2025Updated 7 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 3 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,147Oct 19, 2025Updated 5 months ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- Main Sigma Rule Repository☆10,279Apr 1, 2026Updated last week
- A repository for using windows event forwarding for incident detection and response☆1,306Sep 8, 2025Updated 7 months ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆293May 2, 2024Updated last year
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,646Apr 15, 2025Updated 11 months ago
- Re-play Security Events☆1,732Mar 20, 2024Updated 2 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,217Aug 7, 2025Updated 8 months ago
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,413Jan 26, 2026Updated 2 months ago
- A collection of Red Team focused tools, scripts, and notes☆1,146Nov 19, 2024Updated last year
- Your Everyday Threat Intelligence☆1,967Updated this week
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- ☆333Dec 8, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- HTA encryption tool for RedTeams☆1,423Nov 9, 2022Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,380Updated this week
- An information security preparedness tool to do adversarial simulation.☆1,136Apr 1, 2019Updated 7 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆302Mar 19, 2026Updated 3 weeks ago
- A tool for deploying and detecting use of Active Directory honeytokens☆508Jul 13, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Sysmon configuration file template with default high-quality event tracing☆5,453Jul 3, 2024Updated last year
- Respounder detects presence of responder in the network.☆322Jun 15, 2019Updated 6 years ago
- Scanning pastebin with yara rules☆1,131Jan 10, 2026Updated 3 months ago
- GRR Rapid Response: remote live forensics for incident response☆5,047Feb 16, 2026Updated last month
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,650Jun 6, 2024Updated last year
- A collaborative, multi-platform, red teaming framework☆4,399Mar 30, 2026Updated last week
- Automated Adversary Emulation Platform☆6,886Updated this week