Infosec_Reference
awesome-honeypots
Infosec_Reference | awesome-honeypots | |
---|---|---|
9 | 21 | |
5,365 | 8,056 | |
- | - | |
4.2 | 5.9 | |
17 days ago | about 1 month ago | |
CSS | Python | |
MIT License | Artistic License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Infosec_Reference
- How to improve documentation / technical writing skills?
- Manuals
-
Cybersecurity Repositories
Infosec Reference
- About Russia's Industrial Control System Attacks...
- Advise please?
- I'm preparing for the interview and I've curated a list of resources that might be helpful for you also.
-
Noob questions and advice
Thereโs this: https://github.com/rmusser01/Infosec_Reference
-
How to grt better/ homelab help
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Building_A_Lab.md Has some ideas. The first things to decide on would be what do you want to use for your hosting environment. Do you want to run ESXi? HyperV? Xen? Something else? What do you want to learn? What sort of environments do you want to simulate?
- Cybersec Bootcamp
awesome-honeypots
- Building a Windows Honeypots?
- Covenant C2 - unrecognized connections
- Wordlists
-
I have 10 Linux VMs that I want to run a bash script on misconfiguring OS layer options. Comment your ideas! More info in post.
you're looking for a honeypot
-
How to make honeypots.
You may be interested in https://github.com/paralax/awesome-honeypots
- What is the best open source honeypot? [Need Experiences]
- Intentionally Vulnerable Website
-
Cybersecurity 101 โ What is a Honeypot?
Also you might want to check these lists here and here for deploying some more honeypots.
-
Cybersecurity Repositories
Honeypots
-
Using honeypots data to create IOCs collection
Agreed with u/Sloky, if you want catch internal adversaries you may need a lot of tweaking. There are plenty of good lists out there such as this and this and this one
What are some alternatives?
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
tpotce - ๐ฏ T-Pot - The All In One Honeypot Platform ๐
hackdroid - Security Apps for Android
Awesome-WAF - ๐ฅ Web-application firewalls (WAFs) from security standpoint.
red_team_attack_lab - Red Team Attack Lab for TTP testing & research
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
the_cyber_plumbers_handbook - Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
hacker101 - Source code for Hacker101.com - a free online web and mobile security class.
AlanFramework - A C2 post-exploitation framework
bugbounty-cheatsheet - A list of interesting payloads, tips and tricks for bug bounty hunters.
dvws-node - Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API related vulnerabilities.