Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features
☆156Dec 2, 2025Updated 3 months ago
Alternatives and similar repositories for trapster-community
Users that are interested in trapster-community are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, wit…☆32Aug 29, 2025Updated 6 months ago
- ☆75Mar 19, 2025Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆266Nov 22, 2025Updated 4 months ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆441Feb 13, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Advanced firmware for M5Dial devices, enabling WiFi captive portals, SSID management, Karma attack tools, and BadUSB scripting for enhanc…☆21Feb 19, 2025Updated last year
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆24Feb 23, 2026Updated last month
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆56Dec 21, 2025Updated 3 months ago
- The CoolKid'sBadge is a convention electronic badge created for the LeHack2024 Cyber-security convention in Paris(Fr) (not affiliated), c…☆18Sep 17, 2024Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 9 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- secator - the pentester's swiss knife☆1,249Mar 21, 2026Updated last week
- Automatically run and populate a new instance of BH CE☆120Jan 30, 2026Updated last month
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Aranya user library, daemon, and policy code☆194Updated this week
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Mar 6, 2025Updated last year
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆26Updated this week
- Arduino library for M5Stack LLM Module☆33Oct 29, 2025Updated 4 months ago
- ☆41Oct 29, 2024Updated last year
- Active Directory Mindmap Recipes: A Compromise à la Carte☆151Sep 4, 2025Updated 6 months ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- Compile SharpHound and others on Linux☆24Aug 16, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆616Updated this week
- ☆107Dec 9, 2025Updated 3 months ago
- ☆10Aug 17, 2021Updated 4 years ago
- ☆98Jun 22, 2025Updated 9 months ago
- A collection of helpful resources related to Cybersecurity and a lot more.☆25Feb 22, 2026Updated last month
- C++ Reflective Assembly Loader☆31Mar 7, 2025Updated last year
- Threat-hunting tool for Linux☆1,047Mar 16, 2026Updated last week
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- Bitor Scanning Software☆457Nov 7, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- for Windows Malware Analysis☆16May 14, 2020Updated 5 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- AxoSyslog - the scalable security data processor☆104Mar 20, 2026Updated last week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- A sleek and intuitive GUI built with Tkinter for managing the Evil-BW16 device, designed for ethical WiFi network testing and penetration…☆59Updated this week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated 11 months ago