mthcht
Follow
🏠
Working from home
Threat Hunting - DFIR - Detection Engineering
Highlights
- Pro
Stars
honeypot
6 repositories
A suite of tools to disrupt campaigns using the Sliver C2 framework.
Canarytokens helps track activity and actions on your network.
An ADCS honeypot to catch attackers in your internal network.
Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/