0x4D31 / honeyLambda
honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
☆516Updated 6 years ago
Alternatives and similar repositories for honeyLambda:
Users that are interested in honeyLambda are comparing it to the libraries listed below
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- AWS Auditing & Hardening Tool☆711Updated 5 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆344Updated 3 years ago
- Interface to manage and centralize Google Alert information☆231Updated 2 years ago
- Various Tools and Docker Images☆279Updated 6 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆174Updated 6 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆415Updated 2 years ago
- Enforce ownership and data security within AWS☆448Updated 4 years ago
- Tools for auditing WAFS☆458Updated 4 years ago
- for AWS Security material☆246Updated 2 years ago
- BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.☆1,420Updated last year
- A collection of AWS penetration testing junk☆1,190Updated last year
- HonSSH is designed to log all SSH communications between a client and server.☆374Updated 3 years ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆638Updated 3 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆596Updated 3 years ago
- AWS Security Tools (AST) in a simple Docker container.☆287Updated 3 years ago
- Distributed alerting for the masses!☆995Updated 6 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆731Updated last year
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆463Updated 2 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆323Updated 6 months ago
- Incident Response Forensic Framework☆599Updated 5 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆907Updated 5 years ago
- A Github organization reconnaissance tool.☆216Updated last year
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- barq: The AWS Cloud Post Exploitation framework!☆387Updated 2 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆289Updated last year
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆272Updated 6 years ago
- Vulners Python API wrapper☆360Updated last month
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆437Updated last year