cypwnpwnsocute / RedisHoneyPotView external linksLinks
High Interaction Honeypot Solution for Redis protocol
☆25Apr 23, 2021Updated 4 years ago
Alternatives and similar repositories for RedisHoneyPot
Users that are interested in RedisHoneyPot are comparing it to the libraries listed below
Sorting:
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆57Nov 23, 2018Updated 7 years ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆63Dec 27, 2020Updated 5 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 6 years ago
- Code for shelLM tool☆57Jan 28, 2025Updated last year
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- DICOM Honeypot☆27Dec 5, 2025Updated 2 months ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- A Visual Studio Code Extension agent for Mythic C2☆71Nov 5, 2024Updated last year
- A DICOM honeypot for detecting and logging unauthorized access attempts☆49Jan 15, 2026Updated last month
- A simple and effective phpmyadmin honeypot☆68Feb 11, 2018Updated 8 years ago
- Cybersecurity Psychology Framework☆19Updated this week
- Parses BGP/AS data from multiple different sources☆11Dec 4, 2021Updated 4 years ago
- GitHub 泄露的 API 密钥扫描器。支持 OpenAI/Claude/Gemini/Azure。异步验证 + GPT-4 探测 + 余额检测。丰富的 TUI 控制面板。☆23Jan 11, 2026Updated last month
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Dec 25, 2024Updated last year
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆49Dec 17, 2025Updated 2 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆13Oct 7, 2024Updated last year
- Serialize ngraph.graph to binary format☆10Oct 9, 2025Updated 4 months ago
- IoT and Operational Technology Honeypot☆105Oct 7, 2023Updated 2 years ago
- A suite of tools to store and retrieve binary data in DNS records, and a browser that can surf pages served over DNS instead of HTTP☆19Sep 13, 2021Updated 4 years ago
- A transpiler/module system polyfill for C++☆38Aug 7, 2015Updated 10 years ago
- 自研的linux_c2☆13Jun 28, 2023Updated 2 years ago
- EFI boot manager (PATCHES)☆10May 18, 2012Updated 13 years ago
- ADB监测第三方应用内存使用情况.基于Electron + React + Koa2. 使用Koa2执行adb命令,React负责渲染,echarts渲染图表☆11Feb 3, 2023Updated 3 years ago
- Windows Event Forwarding/Collection - A simple way to get quick, comprehensive logging for a Windows environment.☆16Jun 5, 2022Updated 3 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- A versatile Go tool for effortlessly generating mock HTTP APIs for all your needs.☆18Feb 9, 2026Updated last week
- In ancient Egypt the pelican was believed to possess the ability to prophesy safe passage in the underworld. Pelicans are ferocious eater…☆11Apr 7, 2023Updated 2 years ago
- Inefficient and syntactically unwieldy implementation of algebraic effects in Python using generators☆13Aug 31, 2020Updated 5 years ago
- Go library with various time utilities used at Mailgun.☆10Jun 10, 2019Updated 6 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 6 months ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- A simple go app that connects to a sqlite3 database☆11Sep 18, 2018Updated 7 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- Comprehensive cybersecurity home lab setup that integrates various technologies and configurations to enhance skills in network security,…☆25Oct 15, 2024Updated last year
- A self-led workshop to demonstrate the power of go templates and how much fun you can have while using them with OpenShift!☆12Sep 1, 2020Updated 5 years ago