0x4D31 / honeyLambdaLinks
honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
☆522Updated 7 years ago
Alternatives and similar repositories for honeyLambda
Users that are interested in honeyLambda are comparing it to the libraries listed below
Sorting:
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- AWS Auditing & Hardening Tool☆713Updated 5 years ago
- Various Tools and Docker Images☆280Updated 8 months ago
- Interface to manage and centralize Google Alert information☆231Updated 3 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆738Updated last year
- for AWS Security material☆249Updated 3 years ago
- Distributed alerting for the masses!☆993Updated 7 years ago
- Incident Response Forensic Framework☆609Updated 6 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆602Updated 3 years ago
- Enforce ownership and data security within AWS☆445Updated 5 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆174Updated 7 years ago
- Repository demonstrating the Capital One breach on your AWS account☆244Updated 4 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆348Updated 4 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆377Updated 4 years ago
- AWS Lambda Infection Toolkit // Persistent Lambda Malware PoC☆159Updated 9 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Updated 3 years ago
- A UNIX security auditing tool based on several security frameworks☆320Updated 3 months ago
- barq: The AWS Cloud Post Exploitation framework!☆387Updated 3 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆292Updated 2 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 9 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆693Updated 5 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆326Updated last year
- ☆352Updated 4 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 8 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆492Updated 3 years ago
- Google Cloud Platform Security Tool☆235Updated 6 years ago
- A docker based honeypot.☆151Updated 10 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated last week
- An intercepting proxy for web application testing☆411Updated 7 years ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆640Updated 4 years ago