APTnotes
awesome-honeypots
APTnotes | awesome-honeypots | |
---|---|---|
5 | 21 | |
3,410 | 8,040 | |
- | - | |
3.1 | 5.9 | |
4 months ago | about 1 month ago | |
Python | ||
- | Artistic License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
APTnotes
-
Ask HN: What Happened with the Grugq Article?
>with case studies and getting as niche on specific things as possible.
Then definitely you can touch on APT marketplace, unlike the usual zeroday ones, those are -as the name implies, advanced, and mostly are state sponsored, you can find some of these in this sheet [1], or other sources [2] or older ones [3]. Now, for other zero day exploits, you can dig into your typical threat intelligence feeds to have an idea, some of these are daily updated [4] [5] [6] among a lot more of other resources, there are also underground databases for zero day and even APT updated as of yesterday, and also online marketplaces for those where you can buy/sell compromised RDP servers / webmail / cPanels / etc., or even services like smtp-sms for phishing among others, unfortunately, I can’t and won’t list any of these in here for obvious reasons, however, if you dig a little deeper definitely you will find something, just don’t use the usual search engines and normal channels, and get the usual security precautions like sandbox/vpns/etc. when access any of these sites, preferably in an isolated OS too.
And thanks, not expert enough for sure!
[1] https://docs.google.com/spreadsheets/u/1/d/1H9_xaxQHpWaa4O_S...
[2] https://gist.github.com/Neo23x0/c4f40629342769ad0a8f3980942e...
[3] https://github.com/kbandla/APTnotes
[4] https://bazaar.abuse.ch/browse/
[5] https://www.exploitalert.com/browse-exploit.html
[6] https://threatfox.abuse.ch/browse/
-
Seeking Datasets on Malware
I trained up this repo in my privateGPT - https://github.com/kbandla/APTnotes
- Le Burkina Faso
-
Cybersecurity Repositories
APT Notes
- Les ressortissants russes en France reçoivent en ce moment sur leurs numéros de téléphone russe des demandes pour l'enrôlement dans l'armée en vue de la guerre avec l'Ukraine
awesome-honeypots
- Building a Windows Honeypots?
- Covenant C2 - unrecognized connections
- Wordlists
-
I have 10 Linux VMs that I want to run a bash script on misconfiguring OS layer options. Comment your ideas! More info in post.
you're looking for a honeypot
-
How to make honeypots.
You may be interested in https://github.com/paralax/awesome-honeypots
- What is the best open source honeypot? [Need Experiences]
- Intentionally Vulnerable Website
-
Cybersecurity 101 — What is a Honeypot?
Also you might want to check these lists here and here for deploying some more honeypots.
-
Cybersecurity Repositories
Honeypots
-
Using honeypots data to create IOCs collection
Agreed with u/Sloky, if you want catch internal adversaries you may need a lot of tweaking. There are plenty of good lists out there such as this and this and this one
What are some alternatives?
data - APTnotes data
tpotce - 🍯 T-Pot - The All In One Honeypot Platform 🐝
ThreatHunter-Playbook - A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Awesome-WAF - 🔥 Web-application firewalls (WAFs) from security standpoint.
awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
osx-and-ios-security-awesome - OSX and iOS related security tools
hacker101 - Source code for Hacker101.com - a free online web and mobile security class.
awesome-adversarial-machine-learning - A curated list of awesome adversarial machine learning resources
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
awesome-iocs - A collection of sources of indicators of compromise.
dvws-node - Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API related vulnerabilities.