Ensnare is packaged as a gem plugin for Ruby on Rails and was developed to allow configuring and deploying a basic malicious behavior detection and response scheme in less than ten minutes. Ensnare uses a combination of Honey Traps to entice malicious users, and a configurable suite of Trap Responses to confuse, allude, delay, or stop an attacker. Already heard about the tool and want to try it out? Do it! - Install the gem by adding it to your project's Gemfile: gem 'ensnare', :git => 'git@github.com:ahoernecke/Ensnare.git' - Install the gem: bundle install - Run the migrations for Ensnare: rake ensnare:install:migrations rake db:migrate - Enable parameter tampering for your application by changing the mass_assignment_sanitizer: vi config/environments/<ENVIRONMENT>.rb - Set config.active_record.mass_assignment_sanitizer to logger: config.active_record.mass_assignment_sanitizer = :logger - Enable Ensnare in your application_controller.rb file: vi app/controllers/application_controller.rb - Append the following filter below protect_from_forgery in your application_controller.rb file: before_filter :ensnare - Add the following to the end of your routes.rb file: mount Ensnare::Engine => "/ensnare", :a
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
LogRhythm NetMon is a network traffic analytics tool that provides real-time visibility, automated threat detection, and investigation capabilities for organizational networks.
Akamai Guardicore Segmentation is a microsegmentation tool that provides network visibility, policy creation, and enforcement to prevent lateral movement and protect critical assets in diverse IT environments.
ICAP Server with Yara scanner for URL and content.
A lookup service for AS-numbers and prefixes by country
A multiplatform C++ library for capturing, parsing, and crafting network packets with support for various network protocols.