0xBallpoint / trapster-communityView external linksLinks
Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features
☆157Dec 2, 2025Updated 2 months ago
Alternatives and similar repositories for trapster-community
Users that are interested in trapster-community are comparing it to the libraries listed below
Sorting:
- Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, wit…☆30Aug 29, 2025Updated 5 months ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆260Nov 22, 2025Updated 2 months ago
- ☆75Mar 19, 2025Updated 10 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Jul 31, 2024Updated last year
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆50Dec 21, 2025Updated last month
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆437Oct 4, 2025Updated 4 months ago
- secator - the pentester's swiss knife☆1,236Updated this week
- Aranya user library, daemon, and policy code☆194Feb 6, 2026Updated last week
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 3 years ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Mar 6, 2025Updated 11 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆24Apr 30, 2025Updated 9 months ago
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆23Dec 8, 2025Updated 2 months ago
- Pen Test Report Generation and Assessment Collaboration☆590Updated this week
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Sep 8, 2024Updated last year
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆600Feb 7, 2026Updated last week
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 8 months ago
- A centralized and enhanced memory analysis platform☆517Jul 13, 2025Updated 7 months ago
- A powerful tool for automated LLM fuzzing. It is designed to help developers and security researchers identify and mitigate potential jai…☆1,193Feb 6, 2026Updated last week
- Threat-hunting tool for Linux☆1,035Feb 3, 2026Updated last week
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆23Updated this week
- Validate the isolation posture of your container environment.☆311Dec 22, 2025Updated last month
- Automatically run and populate a new instance of BH CE☆113Jan 30, 2026Updated 2 weeks ago
- Bitor Scanning Software☆454Nov 7, 2025Updated 3 months ago
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆432Feb 5, 2026Updated last week
- ☆10Aug 17, 2021Updated 4 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Feb 4, 2026Updated last week
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆471Feb 7, 2026Updated last week
- Open Adversarial Exposure Validation Platform☆1,618Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆724Aug 9, 2025Updated 6 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆148Sep 4, 2025Updated 5 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆224Sep 4, 2024Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆336Aug 7, 2024Updated last year
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- ☆15May 3, 2024Updated last year