thinkst / canarytokens-docker
Docker configuration to quickly setup your own Canarytokens.
☆609Updated 7 months ago
Alternatives and similar repositories for canarytokens-docker:
Users that are interested in canarytokens-docker are comparing it to the libraries listed below
- Canarytokens helps track activity and actions on your network.☆1,788Updated this week
- Simple Bash IOC Scanner☆713Updated 2 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,012Updated 3 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,309Updated this week
- Incident Response Methodologies☆1,024Updated 6 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,507Updated 6 months ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆999Updated 4 years ago
- An information security preparedness tool to do adversarial simulation.☆1,106Updated 5 years ago
- Create actionable data from your Vulnerability Scans☆1,363Updated 2 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆990Updated last week
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,413Updated last month
- PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform☆627Updated 3 weeks ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆271Updated last year
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,279Updated 9 months ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆533Updated 10 months ago
- CLI tool to manage a SIFT Install☆417Updated last year
- Your Everyday Threat Intelligence☆1,786Updated this week
- A repository for using osquery for incident detection and response☆834Updated 2 years ago
- Logging Made Easy☆707Updated last year
- Tools for hunting for threats.☆573Updated 3 months ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆716Updated 4 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆694Updated this week
- Home of the dionaea honeypot☆723Updated 5 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,253Updated 4 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,023Updated this week
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆497Updated 2 years ago
- Domain Password Audit Tool for Pentesters☆931Updated 2 years ago
- Configuration files for the SOF-ELK VM☆1,543Updated this week
- CyLR - Live Response Collection Tool☆659Updated 2 years ago
- Extract and aggregate threat intelligence.☆840Updated 11 months ago