mordor | pwnspoof | |
---|---|---|
6 | 4 | |
1,551 | 252 | |
0.7% | 0.4% | |
5.6 | 3.7 | |
about 2 months ago | 8 months ago | |
PowerShell | Python | |
MIT License | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mordor
Posts with mentions or reviews of mordor.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-11-15.
- SOC with machine learning
-
What tooling/scripts/capability would your Blueteam benefit from? Add your wish to the comments 👇🏿 and it might come true..
https://github.com/OTRF/Security-Datasets -> Any table in sentinel
- Dummy security logs to practice with team?
-
Cybersecurity bootcamp
Cloud resources (like Simuland: https://github.com/Azure/SimuLand ) might let you spin up your environment without at-home resources, but you can also learn about what attacks look like and how they work in defenses using something like the OTRF project: https://github.com/OTRF/Security-Datasets
-
Simplest path to ECS-formatted winlogbeat style json file import
To get started as easily as possible we’re looking to use data from the security datasets (formerly Mordor) project https://github.com/OTRF/Security-Datasets and converting some of this data to winlogbeat/ECS using this tool: https://github.com/barvhaim/mordor2ecs
-
How to grt better/ homelab help
Exactly! Either inline, or mirror your traffic via SPAN - assuming quite a lot of phones, tablets and other gear you‘ll definitely start spotting some not-so-hot traffic quite soon. In case you can arrange for a public IP at home, start tapping in and profile your visitors. In case you deem your homenet too boring - as mentioned - Mordor - hit your Onion with actual malicious traffic: https://github.com/OTRF/mordor
pwnspoof
Posts with mentions or reviews of pwnspoof.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-01-19.
-
Tool for Creating Randomized IR Scenarios
pwnspoof
- Dummy security logs to practice with team?
-
New to Graylog
If you need sample security logs, check out this fake attack log tool I wrote https://github.com/punk-security/pwnspoof
- pwnSpoof - generates realistic spoofed log files for common web servers with customisable attack scenarios
What are some alternatives?
When comparing mordor and pwnspoof you can also consider the following projects:
HELK - The Hunting ELK
EnterprisePurpleTeaming - Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
ecs-mapper - Translate an ECS mapping CSV to starter pipelines for Beats, Elasticsearch or Logstash
SecGen - Create randomly insecure VMs
loglizer - A machine learning toolkit for log-based anomaly detection [ISSRE'16]
mordor2ecs - Windows log to ECS format for Mordor large dataset