☆75Mar 19, 2025Updated last year
Alternatives and similar repositories for Mirage
Users that are interested in Mirage are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Nov 21, 2023Updated 2 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- ☆40Aug 2, 2024Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆113Jan 2, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆132Jan 28, 2025Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Add a layer of active defense to your cloud applications.☆104Mar 14, 2026Updated last week
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 6 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆174Mar 2, 2026Updated 3 weeks ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆18Jul 30, 2024Updated last year
- Clean accounts over permissions in GCP infra at scale☆71May 9, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Updated this week
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- ☆53Oct 27, 2024Updated last year
- Lambda function that streamlines containment of an AWS account compromise☆344Dec 1, 2023Updated 2 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Qemuno Framework☆24Sep 8, 2022Updated 3 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆156Dec 2, 2025Updated 3 months ago
- A multi-vault secret injection tool for safely injecting secrets into app environment☆133Mar 2, 2026Updated 3 weeks ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆293Sep 4, 2024Updated last year
- Create honeypots for cloud environments☆112Oct 6, 2025Updated 5 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Manage agents in Agentspace Agent Gallery and Agent Engine☆29Aug 22, 2025Updated 7 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆88Dec 20, 2024Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆171Updated this week
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- A Python tool to manage GitHub Organizations and perform backup☆21Jan 6, 2026Updated 2 months ago
- Generate datasets of cloud audit logs for common attacks☆235Mar 17, 2026Updated last week