Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features
☆161Apr 14, 2026Updated 3 weeks ago
Alternatives and similar repositories for trapster-community
Users that are interested in trapster-community are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, wit…☆32Aug 29, 2025Updated 8 months ago
- ☆75Mar 19, 2025Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆270Nov 22, 2025Updated 5 months ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆56Dec 21, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆24Feb 23, 2026Updated 2 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 10 months ago
- secator - the pentester's swiss knife☆1,279May 1, 2026Updated last week
- Automatically run and populate a new instance of BH CE☆121Jan 30, 2026Updated 3 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Aranya user library, daemon, and policy code☆195Apr 24, 2026Updated last week
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆33Mar 6, 2025Updated last year
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆28Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Active Directory Mindmap Recipes: A Compromise à la Carte☆152Sep 4, 2025Updated 8 months ago
- Compile SharpHound and others on Linux☆24Aug 16, 2024Updated last year
- ☆109Dec 9, 2025Updated 4 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆647Updated this week
- ☆10Aug 17, 2021Updated 4 years ago
- ☆99Jun 22, 2025Updated 10 months ago
- Pen Test Report Generation and Assessment Collaboration☆596Updated this week
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated last year
- A collection of helpful resources related to Cybersecurity and a lot more.☆25Feb 22, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- C++ Reflective Assembly Loader☆32Mar 7, 2025Updated last year
- Threat-hunting tool for Linux☆1,057Apr 30, 2026Updated last week
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Bitor Scanning Software☆460Nov 7, 2025Updated 6 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 4 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- AxoSyslog - the scalable security data processor☆107Apr 29, 2026Updated last week
- A powerful tool for automated LLM fuzzing. It is designed to help developers and security researchers identify and mitigate potential jai…☆1,352Feb 6, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automated security investigation tool using Microsoft MCP Servers, GitHub Copilot, Python Modules and custom copilot-instructions.☆192Updated this week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated last year
- 🐧 SysWarden is an ultra-lightweight Host-based Security Orchestrator for Linux.☆218Updated this week
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 5 months ago
- Ethical hacking, CTF, tools & etc☆22Feb 13, 2021Updated 5 years ago
- Open Adversarial Exposure Validation Platform☆1,692Updated this week
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆106Apr 21, 2024Updated 2 years ago