Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features
☆157Dec 2, 2025Updated 3 months ago
Alternatives and similar repositories for trapster-community
Users that are interested in trapster-community are comparing it to the libraries listed below
Sorting:
- Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, wit…☆32Aug 29, 2025Updated 6 months ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆261Nov 22, 2025Updated 3 months ago
- ☆75Mar 19, 2025Updated 11 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆50Dec 21, 2025Updated 2 months ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆440Feb 13, 2026Updated 3 weeks ago
- secator - the pentester's swiss knife☆1,244Updated this week
- Aranya user library, daemon, and policy code☆194Updated this week
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Mar 6, 2025Updated last year
- Pen Test Report Generation and Assessment Collaboration☆591Updated this week
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆24Feb 23, 2026Updated last week
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆25Apr 30, 2025Updated 10 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆192Sep 8, 2024Updated last year
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆608Updated this week
- A multi-vault secret injection tool for safely injecting secrets into app environment☆133Updated this week
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 9 months ago
- A centralized and enhanced memory analysis platform☆520Jul 13, 2025Updated 7 months ago
- Threat-hunting tool for Linux☆1,046Feb 16, 2026Updated 2 weeks ago
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆23Updated this week
- AxoSyslog - the scalable security data processor☆104Feb 28, 2026Updated last week
- Automatically run and populate a new instance of BH CE☆118Jan 30, 2026Updated last month
- Bitor Scanning Software☆455Nov 7, 2025Updated 4 months ago
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆434Feb 5, 2026Updated last month
- ☆105Dec 9, 2025Updated 2 months ago
- ☆10Aug 17, 2021Updated 4 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆471Feb 14, 2026Updated 3 weeks ago
- Open Adversarial Exposure Validation Platform☆1,634Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆725Feb 14, 2026Updated 3 weeks ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆226Sep 4, 2024Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆336Aug 7, 2024Updated last year
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year