thinkst / canarytokens-dockerLinks
Docker configuration to quickly setup your own Canarytokens.
☆637Updated 2 months ago
Alternatives and similar repositories for canarytokens-docker
Users that are interested in canarytokens-docker are comparing it to the libraries listed below
Sorting:
- Canarytokens helps track activity and actions on your network.☆1,933Updated this week
- DShield Raspberry Pi Sensor☆488Updated last month
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,026Updated 3 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆291Updated last year
- Simple Bash IOC Scanner☆756Updated 3 years ago
- Python library for connecting to CertStream☆457Updated last year
- E-Mail Header Analyzer☆689Updated 2 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,082Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆541Updated 4 months ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,024Updated 5 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆726Updated this week
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,513Updated 2 months ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆502Updated 2 years ago
- Incident Response Methodologies☆1,025Updated 7 years ago
- Pattern recognition for hosts, services, and content☆743Updated last week
- Data exfiltration over DNS request covert channel☆871Updated last year
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆481Updated 5 years ago
- A mostly-serverless distributed hash cracking platform☆815Updated last year
- Tools for hunting for threats.☆593Updated 4 months ago
- Incident Response Hierarchy of Needs☆463Updated 2 years ago
- Logging Made Easy☆711Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Updated last year
- AI-based, context-driven network device ranking☆300Updated last year
- Create actionable data from your Vulnerability Scans☆1,391Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,133Updated 6 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆326Updated last year
- Attack Surface Management since before Attack Surface Management was a thing☆652Updated this week
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆586Updated this week
- Credentials catching honeypot☆383Updated last year
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago