Galah: An LLM-powered web honeypot.
☆642Jul 24, 2025Updated 8 months ago
Alternatives and similar repositories for galah
Users that are interested in galah are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive, dynamic, and realistic LLM honeypots☆76Feb 18, 2025Updated last year
- Code for shelLM tool☆57Jan 28, 2025Updated last year
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆280Jun 13, 2025Updated 9 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A secure low code honeypot framework, leveraging AI for System Virtualization.☆1,907Mar 12, 2026Updated 2 weeks ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,212Dec 29, 2025Updated 2 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Live Feed of C2 servers, tools, and botnets☆760Updated this week
- ☆569Mar 28, 2024Updated last year
- ☆107Dec 9, 2025Updated 3 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆305Mar 19, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆791Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,934Jan 20, 2026Updated 2 months ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- ☆23Mar 4, 2025Updated last year
- Threat-hunting tool for Linux☆1,047Mar 16, 2026Updated last week
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated last year
- Automatically created C2 Feeds☆668Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 11, 2026Updated 2 weeks ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆408Dec 29, 2023Updated 2 years ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- Generate datasets of cloud audit logs for common attacks☆235Mar 17, 2026Updated last week
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- JA4+ is a suite of network fingerprinting standards☆1,815Mar 16, 2026Updated last week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,088Updated this week
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆291Dec 6, 2025Updated 3 months ago
- Canary Detection☆194Oct 20, 2025Updated 5 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆251Updated this week
- Automated Adversary Emulation Platform☆6,831Mar 20, 2026Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 8 months ago
- A resource containing all the tools each ransomware gangs uses☆1,332Mar 18, 2026Updated last week