Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for precise detection and notification specifically for honeyservices activity.
☆51Nov 16, 2024Updated last year
Alternatives and similar repositories for HoneyTrail
Users that are interested in HoneyTrail are comparing it to the libraries listed below
Sorting:
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Feb 24, 2026Updated last week
- Common Golang Packages for use by the Various Cloud Nuke Tools☆55Feb 26, 2026Updated last week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Feb 22, 2026Updated last week
- Anvilogic Forge☆115Sep 18, 2025Updated 5 months ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Updated this week
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- ☆23Mar 4, 2025Updated last year
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- ☆23Sep 20, 2024Updated last year
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- A tool to uncover undocumented APIs from the AWS Console.☆116Apr 29, 2025Updated 10 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Generate datasets of cloud audit logs for common attacks☆234Feb 13, 2026Updated 3 weeks ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆224Sep 4, 2024Updated last year
- Expand IAM Actions with Wildcards☆34Updated this week
- ☆229Feb 24, 2026Updated last week
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- AWS honey token manager☆89Aug 1, 2024Updated last year
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.☆70Oct 30, 2024Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆335Jan 12, 2026Updated last month
- ☆18Jul 30, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆217Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- A menagerie of insecure and exploitable GitHub Actions workflows and action definitions☆19Oct 16, 2025Updated 4 months ago
- ☆71Jan 8, 2025Updated last year
- AWS Clean Untagged Resources will notify you on Slack and terminate/stop untagged EC2/RDS resources!☆15Jan 16, 2023Updated 3 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆50Dec 17, 2025Updated 2 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆76May 27, 2024Updated last year