awesome-iocs
awesome-honeypots
awesome-iocs | awesome-honeypots | |
---|---|---|
3 | 21 | |
733 | 8,077 | |
- | - | |
10.0 | 5.9 | |
about 3 years ago | about 2 months ago | |
Shell | Python | |
GNU General Public License v3.0 or later | Artistic License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-iocs
-
Private Spies Hired by FBI and Corporations Infiltrate Discord, Reddit, WhatsApp
Is your iOS device hardened, e.g. Lockdown Mode, locally supervised by Apple Configurator 2 with restrictive policies? You can also look for forensic artifacts in iOS device backups.
https://docs.mvt.re/en/latest/ios/methodology/
https://www.amnesty.org/en/latest/research/2021/07/forensic-...
https://github.com/sroberts/awesome-iocs
-
IOC hunt ( Indicators of compromise )
Not sure this is an intel question so much as a cybersecurity question. If you're just looking for iocs the best ones are available with a contract from the various cybersecurity firms. If you have a specific worry, it is probably worth a threat hunt with one of them. If not, you can google what public databases are available.
-
Cybersecurity Repositories
IOC
awesome-honeypots
- Building a Windows Honeypots?
- Covenant C2 - unrecognized connections
- Wordlists
-
I have 10 Linux VMs that I want to run a bash script on misconfiguring OS layer options. Comment your ideas! More info in post.
you're looking for a honeypot
-
How to make honeypots.
You may be interested in https://github.com/paralax/awesome-honeypots
- What is the best open source honeypot? [Need Experiences]
- Intentionally Vulnerable Website
-
Cybersecurity 101 — What is a Honeypot?
Also you might want to check these lists here and here for deploying some more honeypots.
-
Cybersecurity Repositories
Honeypots
-
Using honeypots data to create IOCs collection
Agreed with u/Sloky, if you want catch internal adversaries you may need a lot of tweaking. There are plenty of good lists out there such as this and this and this one
What are some alternatives?
APTnotes - Various public documents, whitepapers and articles about APT campaigns
tpotce - 🍯 T-Pot - The All In One Honeypot Platform 🐝
awesome-ml-for-cybersecurity - :octocat: Machine Learning for Cyber Security
Awesome-WAF - 🔥 Web-application firewalls (WAFs) from security standpoint.
android-security-awesome - A collection of android security related resources
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
awesome-malware-analysis - Defund the Police.
hacker101 - Source code for Hacker101.com - a free online web and mobile security class.
awesome-hacking - A curated list of awesome Hacking tutorials, tools and resources
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
awesome-incident-response - A curated list of tools for incident response
dvws-node - Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API related vulnerabilities.