0x4D31 / honeyLambda
honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
☆514Updated 6 years ago
Alternatives and similar repositories for honeyLambda:
Users that are interested in honeyLambda are comparing it to the libraries listed below
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- AWS Auditing & Hardening Tool☆710Updated 4 years ago
- Various Tools and Docker Images☆279Updated 6 years ago
- Interface to manage and centralize Google Alert information☆232Updated 2 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆172Updated 6 years ago
- BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.☆1,414Updated last year
- Distributed alerting for the masses!☆995Updated 6 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆344Updated 3 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆723Updated 10 months ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆594Updated 2 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆372Updated 3 years ago
- A collection of AWS penetration testing junk☆1,181Updated last year
- for AWS Security material☆246Updated 2 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Updated 2 years ago
- Incident Response Forensic Framework☆600Updated 5 years ago
- Tools for auditing WAFS☆457Updated 4 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆317Updated 2 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- ☆350Updated 3 years ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated 11 months ago
- A REST API security testing framework.☆326Updated 3 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆453Updated 2 years ago
- WeirdAAL (AWS Attack Library)☆794Updated 2 weeks ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆678Updated 4 years ago
- Vulners Python API wrapper☆358Updated 3 months ago
- Easy-to-use live forensics toolbox for Linux endpoints☆405Updated 10 months ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆437Updated last year