Galah: An LLM-powered web honeypot.
☆645Jul 24, 2025Updated 8 months ago
Alternatives and similar repositories for galah
Users that are interested in galah are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive, dynamic, and realistic LLM honeypots☆76Feb 18, 2025Updated last year
- Code for shelLM tool☆58Jan 28, 2025Updated last year
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆281Jun 13, 2025Updated 10 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆37Oct 21, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A secure low code honeypot framework, leveraging AI for System Virtualization.☆1,947Updated this week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- A web fuzzer using the httpipe format☆98Mar 29, 2024Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Live Feed of C2 servers, tools, and botnets☆772Updated this week
- ☆570Mar 28, 2024Updated 2 years ago
- ☆108Dec 9, 2025Updated 4 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Jan 29, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆304Mar 19, 2026Updated 3 weeks ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆821Updated this week
- Automation tool for Windows Deception Host Burn-In☆85Dec 4, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,944Mar 26, 2026Updated 3 weeks ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- ☆23Mar 4, 2025Updated last year
- Threat-hunting tool for Linux☆1,053Apr 10, 2026Updated last week
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- Signature based honeypot detector tool written in Golang☆110Mar 22, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Automatically created C2 Feeds☆671Apr 9, 2026Updated last week
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 26, 2026Updated 3 weeks ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆408Dec 29, 2023Updated 2 years ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- Mapping of open-source detection rules and atomic tests.☆206Feb 16, 2026Updated 2 months ago
- Generate datasets of cloud audit logs for common attacks☆236Apr 6, 2026Updated last week
- JA4+ is a suite of network fingerprinting standards☆1,859Apr 7, 2026Updated last week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,106Mar 21, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 11 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆292Dec 6, 2025Updated 4 months ago
- Canary Detection☆194Oct 20, 2025Updated 5 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆254Updated this week
- Automated Adversary Emulation Platform☆6,886Apr 10, 2026Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 8 months ago