Compare commits
3 Commits
87869382a4
...
d698d7cbbb
Author | SHA1 | Date |
---|---|---|
mangosteen | d698d7cbbb | |
0xACAB | f8ee8314b7 | |
mangosteen | d6d53a2dfb |
|
@ -218,6 +218,7 @@ See also [awesome-honeypots](https://github.com/paralax/awesome-honeypots).
|
|||
- [CanaryTokens](https://github.com/thinkst/canarytokens) - Self-hostable honeytoken generator and reporting dashboard; demo version available at [CanaryTokens.org](https://canarytokens.org/).
|
||||
- [Kushtaka](https://kushtaka.org) - Sustainable all-in-one honeypot and honeytoken orchestrator for under-resourced blue teams.
|
||||
- [Manuka](https://github.com/spaceraccoon/manuka) - Open-sources intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers.
|
||||
- [Mimicry](https://github.com/chaitin/mimicry) - Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.
|
||||
|
||||
### Tarpits
|
||||
|
||||
|
@ -319,6 +320,7 @@ See also [awesome-pentest § Social Engineering Tools](https://github.com/fabaca
|
|||
- [Metta](https://github.com/uber-common/metta) - Automated information security preparedness tool to do adversarial simulation.
|
||||
- [Network Flight Simulator (`flightsim`)](https://github.com/alphasoc/flightsim) - Utility to generate malicious network traffic and help security teams evaluate security controls and audit their network visibility.
|
||||
- [RedHunt OS](https://github.com/redhuntlabs/RedHunt-OS) - Ubuntu-based Open Virtual Appliance (`.ova`) preconfigured with several threat emulation tools as well as a defender's toolkit.
|
||||
- [Stratus Red Team](https://stratus-red-team.cloud/) - Emulate offensive attack techniques in a granular and self-contained manner against a cloud environment; think "Atomic Red Team™ for the cloud."
|
||||
- [tcpreplay](https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic originally designed to replay malicious traffic patterns to Intrusion Detection/Prevention Systems.
|
||||
|
||||
### Post-engagement analysis and reporting
|
||||
|
|
Loading…
Reference in New Issue