honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
☆523Oct 20, 2018Updated 7 years ago
Alternatives and similar repositories for honeyLambda
Users that are interested in honeyLambda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 7 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- Serverless honeytoken 🕵🏻♂️☆81Jan 10, 2023Updated 3 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 6 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,459Apr 10, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆295Aug 1, 2023Updated 2 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆178Jul 21, 2020Updated 5 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,295Jul 10, 2024Updated last year
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Sep 21, 2020Updated 5 years ago
- A low to medium interaction honeypot.☆472Mar 21, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Issues to consider when planning a red team exercise.☆614Aug 23, 2017Updated 8 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,242Nov 20, 2025Updated 4 months ago
- A collection of AWS penetration testing junk☆1,223Aug 30, 2023Updated 2 years ago
- AWS Auditing & Hardening Tool☆713Feb 4, 2020Updated 6 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆631Oct 16, 2018Updated 7 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆535Aug 1, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- Honeypot deployment made easy☆237Mar 13, 2019Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- An information security preparedness tool to do adversarial simulation.☆1,138Apr 1, 2019Updated 6 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆599Feb 12, 2022Updated 4 years ago
- Command line utility for searching and downloading exploits☆1,815Sep 10, 2025Updated 6 months ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆460Oct 16, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆75Jan 24, 2017Updated 9 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 9 years ago
- online port scan scraper☆1,121Aug 7, 2023Updated 2 years ago
- BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.☆1,446Dec 12, 2023Updated 2 years ago
- ☆282Dec 5, 2017Updated 8 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,803Feb 28, 2025Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,115Apr 26, 2020Updated 5 years ago