adanalvarez / HoneyTrailView external linksLinks
Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for precise detection and notification specifically for honeyservices activity.
☆51Nov 16, 2024Updated last year
Alternatives and similar repositories for HoneyTrail
Users that are interested in HoneyTrail are comparing it to the libraries listed below
Sorting:
- Common Golang Packages for use by the Various Cloud Nuke Tools☆54Feb 3, 2026Updated last week
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Feb 8, 2026Updated last week
- Anvilogic Forge☆114Sep 18, 2025Updated 4 months ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Updated this week
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- ☆23Mar 4, 2025Updated 11 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- ☆23Sep 20, 2024Updated last year
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- A tool to uncover undocumented APIs from the AWS Console.☆116Apr 29, 2025Updated 9 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Generate datasets of cloud audit logs for common attacks☆232Feb 8, 2026Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆225Sep 4, 2024Updated last year
- Expand IAM Actions with Wildcards☆34Updated this week
- ☆228Jan 29, 2026Updated 2 weeks ago
- Open-source best practices for protecting a secure, sensible cloud platform☆129Oct 25, 2024Updated last year
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- AWS honey token manager☆89Aug 1, 2024Updated last year
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.☆69Oct 30, 2024Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Jan 2, 2025Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- ☆18Jul 30, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated last year
- ☆71Jan 8, 2025Updated last year
- AWS Clean Untagged Resources will notify you on Slack and terminate/stop untagged EC2/RDS resources!☆15Jan 16, 2023Updated 3 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆49Dec 17, 2025Updated last month
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 2 weeks ago