Threat Intelligence | Active Directory | OT/ICS Security | IEC 62443
Real-time threat intelligence from SSH, S7, Modbus, MQTT, and HMI honeypots. Track attack patterns, compromised credentials, and attacker behavior.
View Dashboard →Active Directory attack path visualization and analysis. Explore domain relationships, identify privilege escalation paths, and understand AD security posture.
Launch BloodHound →Multi-engine malware scanning with ClamAV and VirusTotal integration. Analyze suspicious files and correlate with honeypot-collected samples.
Analyze Files →Documented incident response procedures for ransomware, data breaches, phishing, and insider threats with detection and containment steps.
View Playbooks →Interactive ATT&CK framework mapping of observed techniques from honeypot data. Track adversary tactics and techniques in real-world attacks.
Explore Matrix →Comprehensive collection of 91 security tools used during Offensive Security certifications. Categorized by purpose with detailed descriptions.
Browse Tools →