thinkst / canarytokens-docker
Docker configuration to quickly setup your own Canarytokens.
☆602Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for canarytokens-docker
- Canarytokens helps track activity and actions on your network.☆1,757Updated this week
- Create actionable data from your Vulnerability Scans☆1,357Updated last year
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆683Updated this week
- Simple Bash IOC Scanner☆697Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,508Updated 4 months ago
- Configuration files for the SOF-ELK VM☆1,497Updated this week
- Scanning pastebin with yara rules☆1,066Updated 5 months ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆996Updated 4 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,008Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,102Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,247Updated 4 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆325Updated 2 months ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,262Updated 7 months ago
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆534Updated last week
- Modular and decentralised honeypot☆2,328Updated last week
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,396Updated 2 months ago
- Domain Password Audit Tool for Pentesters☆908Updated 2 years ago
- E-Mail Header Analyzer☆655Updated last year
- ☆1,051Updated 5 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆584Updated 5 months ago
- A mostly-serverless distributed hash cracking platform☆795Updated 7 months ago
- DShield Raspberry Pi Sensor☆449Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆362Updated this week
- Machinae Security Intelligence Collector☆504Updated 6 months ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆718Updated 4 years ago
- CyLR - Live Response Collection Tool☆647Updated 2 years ago
- Home of the dionaea honeypot☆715Updated 3 months ago
- SimplE RePort wrIting and COllaboration tool☆1,093Updated 4 years ago
- Password spraying using AWS Lambda for IP rotation☆578Updated last year