High Interaction Honeypot Solution for Redis protocol
☆25Apr 23, 2021Updated 5 years ago
Alternatives and similar repositories for RedisHoneyPot
Users that are interested in RedisHoneyPot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- HL7 / FHIR honeypot☆27May 20, 2024Updated last year
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆64Dec 27, 2020Updated 5 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆119Jan 15, 2020Updated 6 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- Low interaction honeypot designed for Android Debug Bridge over TCP/IP☆178Mar 5, 2025Updated last year
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 3 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- Penguin OS Forensic (or Flight) Recorder☆41Mar 27, 2026Updated last month
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Interactive, dynamic, and realistic LLM honeypots☆76Feb 18, 2025Updated last year
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- Simple AWS ELB log parser which parses Classic LB and ALB logs into JSONs☆18May 2, 2025Updated 11 months ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- ☆56Updated this week
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 7 months ago
- Network Honeypot written in Rust☆15Apr 14, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A DICOM honeypot for detecting and logging unauthorized access attempts☆58Apr 16, 2026Updated 2 weeks ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 6 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 9 months ago
- Sysmon Config Pusher - Modernized☆38Jan 7, 2026Updated 3 months ago
- AES-NI bruteforcer for bad Character Sets☆10Jan 17, 2021Updated 5 years ago
- Template for Linux Kernel development on Apple Silicon (aarch64) using VS Code☆18Mar 17, 2024Updated 2 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- IoT and Operational Technology Honeypot☆105Oct 7, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Create styles and themes for your Python desktop applications☆16Mar 21, 2022Updated 4 years ago
- ☆16Sep 12, 2021Updated 4 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- Windows Event Forwarding/Collection - A simple way to get quick, comprehensive logging for a Windows environment.☆16Jun 5, 2022Updated 3 years ago
- Credentials catching honeypot☆392May 21, 2024Updated last year
- A Simple RedLineStealer☆13Aug 30, 2023Updated 2 years ago
- Reaque is an mobile tool where we can share and find things related to Mozambique, the people and things there. From reflections and cult…☆13Sep 10, 2019Updated 6 years ago