0xBallpoint / trapster-communityLinks
Multi-services Honeypot Solution with AI support and dynamic HTTP template
☆125Updated last month
Alternatives and similar repositories for trapster-community
Users that are interested in trapster-community are comparing it to the libraries listed below
Sorting:
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated this week
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆143Updated last week
- Analyze pcaps with Zeek and a Grafana Dashboard☆178Updated last year
- Bitor Scanning Software☆391Updated last week
- Speed up your pentest enumeration☆84Updated this week
- ☆141Updated 3 weeks ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆439Updated this week
- Dredging up secrets from the depths of the file system☆128Updated 8 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆37Updated last year
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆171Updated this week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆383Updated last week
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆124Updated 5 months ago
- DFIR ORC PARSER PROJECT☆25Updated 4 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆121Updated 3 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 9 months ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆282Updated 2 weeks ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆96Updated last month
- Canary Detection☆183Updated last month
- God Mode Detection Rules☆134Updated 11 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆296Updated last week
- Pen Test Report Generation and Assessment Collaboration☆537Updated this week
- Protection against HTML smuggling attacks.☆96Updated last week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆172Updated last month
- ☆74Updated 3 weeks ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 6 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆52Updated last month
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆170Updated 5 months ago
- Mapping of open-source detection rules and atomic tests.☆169Updated 6 months ago