thinkst / canarytokens-dockerView external linksLinks
Docker configuration to quickly setup your own Canarytokens.
☆647Jan 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for canarytokens-docker
Users that are interested in canarytokens-docker are comparing it to the libraries listed below
Sorting:
- Canarytokens helps track activity and actions on your network.☆2,016Updated this week
- Modular and decentralised honeypot☆2,769Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Jan 12, 2026Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated 3 weeks ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,901Jul 6, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292May 2, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,570Updated this week
- A repository for using windows event forwarding for incident detection and response☆1,296Sep 8, 2025Updated 5 months ago
- ☆334Dec 8, 2022Updated 3 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,049Oct 19, 2025Updated 3 months ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,583Apr 15, 2025Updated 9 months ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,142Apr 1, 2019Updated 6 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,203Aug 7, 2025Updated 6 months ago
- A collection of Red Team focused tools, scripts, and notes☆1,143Nov 19, 2024Updated last year
- Main Sigma Rule Repository☆10,109Updated this week
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆728Jan 21, 2020Updated 6 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Oct 19, 2022Updated 3 years ago
- Scanning pastebin with yara rules☆1,126Jan 10, 2026Updated last month
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆264Nov 25, 2023Updated 2 years ago
- A repository for using osquery for incident detection and response☆881Sep 8, 2025Updated 5 months ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,334Jan 30, 2026Updated 2 weeks ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,710Sep 23, 2025Updated 4 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,310Jan 26, 2026Updated 2 weeks ago
- Documentation and scripts to properly enable Windows event logs.☆671Oct 3, 2025Updated 4 months ago
- Your Everyday Threat Intelligence☆1,949Updated this week
- A collaborative, multi-platform, red teaming framework☆4,296Updated this week
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,644Jun 6, 2024Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,548Nov 24, 2025Updated 2 months ago
- Random Tools☆852Oct 20, 2022Updated 3 years ago
- Windows Events Attack Samples☆2,502Jan 24, 2023Updated 3 years ago
- Example VBA Macro for MacOS Mojave☆66Oct 31, 2018Updated 7 years ago