Docker configuration to quickly setup your own Canarytokens.
☆655Apr 1, 2026Updated last month
Alternatives and similar repositories for canarytokens-docker
Users that are interested in canarytokens-docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Canarytokens helps track activity and actions on your network.☆2,057Updated this week
- Linux file read monitor☆92Sep 16, 2023Updated 2 years ago
- Modular and decentralised honeypot☆2,853Updated this week
- Collection of useful Canary tools☆94Apr 24, 2026Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Jan 12, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Detect Tactics, Techniques & Combat Threats☆2,282Jan 21, 2026Updated 3 months ago
- Central correlator for opencanary instances☆17Feb 3, 2022Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,860Apr 24, 2026Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,954Jul 6, 2024Updated last year
- A repository for using osquery for incident detection and response☆891Sep 8, 2025Updated 7 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,541Jan 12, 2026Updated 3 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,167Apr 22, 2026Updated last week
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- Main Sigma Rule Repository☆10,355Apr 24, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A repository for using windows event forwarding for incident detection and response☆1,320Sep 8, 2025Updated 7 months ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆294May 2, 2024Updated 2 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,665Apr 15, 2025Updated last year
- Re-play Security Events☆1,743Mar 20, 2024Updated 2 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,227Aug 7, 2025Updated 8 months ago
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,147Nov 19, 2024Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,433Jan 26, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆333Dec 8, 2022Updated 3 years ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- Your Everyday Threat Intelligence☆1,974Apr 14, 2026Updated 2 weeks ago
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,735Sep 23, 2025Updated 7 months ago
- An information security preparedness tool to do adversarial simulation.☆1,138Apr 1, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,395Updated this week
- Collection of tools that reflect the network dimension into Bloodhound's data☆448Oct 19, 2022Updated 3 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆303Mar 19, 2026Updated last month
- A tool for deploying and detecting use of Active Directory honeytokens☆509Jul 13, 2022Updated 3 years ago
- Sysmon configuration file template with default high-quality event tracing☆5,493Jul 3, 2024Updated last year
- Respounder detects presence of responder in the network.☆323Jun 15, 2019Updated 6 years ago
- Scanning pastebin with yara rules☆1,133Jan 10, 2026Updated 3 months ago