Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features
☆161Mar 29, 2026Updated 2 weeks ago
Alternatives and similar repositories for trapster-community
Users that are interested in trapster-community are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- ☆75Mar 19, 2025Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆266Nov 22, 2025Updated 4 months ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆447Feb 13, 2026Updated 2 months ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆56Dec 21, 2025Updated 3 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆23Feb 23, 2026Updated last month
- The CoolKid'sBadge is a convention electronic badge created for the LeHack2024 Cyber-security convention in Paris(Fr) (not affiliated), c…☆18Sep 17, 2024Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 9 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- Advanced firmware for M5Dial devices, enabling WiFi captive portals, SSID management, Karma attack tools, and BadUSB scripting for enhanc…☆23Feb 19, 2025Updated last year
- secator - the pentester's swiss knife☆1,263Updated this week
- Automatically run and populate a new instance of BH CE☆120Jan 30, 2026Updated 2 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Aranya user library, daemon, and policy code☆194Apr 9, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆33Mar 6, 2025Updated last year
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆26Apr 9, 2026Updated last week
- ☆41Oct 29, 2024Updated last year
- A centralized and enhanced memory analysis platform☆524Mar 20, 2026Updated 3 weeks ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆151Sep 4, 2025Updated 7 months ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- Compile SharpHound and others on Linux☆24Aug 16, 2024Updated last year
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆629Apr 6, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆108Dec 9, 2025Updated 4 months ago
- ☆10Aug 17, 2021Updated 4 years ago
- ☆98Jun 22, 2025Updated 9 months ago
- Pen Test Report Generation and Assessment Collaboration☆594Updated this week
- A collection of helpful resources related to Cybersecurity and a lot more.☆25Feb 22, 2026Updated last month
- C++ Reflective Assembly Loader☆32Mar 7, 2025Updated last year
- Threat-hunting tool for Linux☆1,053Apr 10, 2026Updated last week
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Bitor Scanning Software☆459Nov 7, 2025Updated 5 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Automated security investigation tool using Microsoft MCP Servers, GitHub Copilot, Python Modules and custom copilot-instructions.☆147Updated this week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 3 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- 🐧An ultra-lightweight firewall orchestrator for Linux. SysWarden proactively drops 97% of malicious internet traffic by fusing Data-Shie…☆179Updated this week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated 11 months ago