High Interaction Honeypot Solution for Redis protocol
☆25Apr 23, 2021Updated 5 years ago
Alternatives and similar repositories for RedisHoneyPot
Users that are interested in RedisHoneyPot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- HL7 / FHIR honeypot☆27May 20, 2024Updated 2 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆94Nov 29, 2024Updated last year
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆120Jan 15, 2020Updated 6 years ago
- Code for shelLM tool☆58May 12, 2026Updated last week
- ☆21Jun 29, 2022Updated 3 years ago
- HoneySAP: SAP Low-interaction research honeypot☆50May 1, 2023Updated 3 years ago
- DICOM Honeypot☆28May 11, 2026Updated last week
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- An SMTP Honeypot☆282Dec 30, 2025Updated 4 months ago
- This is a honeypot for IP camera☆19Jul 10, 2023Updated 2 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Visual Studio Code Extension agent for Mythic C2☆72Nov 5, 2024Updated last year
- Explore the http3 by quic with examples☆15Jul 28, 2022Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 3 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 10 years ago
- Penguin OS Forensic (or Flight) Recorder☆41Mar 27, 2026Updated last month
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 9 years ago
- ☆12Jun 4, 2025Updated 11 months ago
- A program for backup & restoration of btrfs subvolumes.☆13Mar 20, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Interactive, dynamic, and realistic LLM honeypots☆76Feb 18, 2025Updated last year
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- ☆59Updated this week
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 7 months ago
- Network Honeypot written in Rust☆15May 11, 2026Updated last week
- A DICOM honeypot for detecting and logging unauthorized access attempts☆58May 13, 2026Updated last week
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 10 months ago
- AES-NI bruteforcer for bad Character Sets☆10Jan 17, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Helpers for getting CHN up and running through the Quickstart guide☆12Mar 2, 2021Updated 5 years ago
- Template for Linux Kernel development on Apple Silicon (aarch64) using VS Code☆18Mar 17, 2024Updated 2 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated last year
- Shows a tiny bar in your tmux statusline with the current CPU usage☆15Aug 25, 2017Updated 8 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆14Nov 30, 2021Updated 4 years ago
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆63Apr 22, 2025Updated last year