Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and uses eBPF to detect, log, and forward alerts when your traps have been accessed.
☆86Mar 3, 2026Updated this week
Alternatives and similar repositories for koney
Users that are interested in koney are comparing it to the libraries listed below
Sorting:
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Updated this week
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 2 months ago
- ☆22Jul 24, 2025Updated 7 months ago
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆55Dec 15, 2025Updated 2 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- ☆11Nov 27, 2024Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- This repository is for code and documentation for Badge Engine, a Digital Promise technology☆18Dec 22, 2025Updated 2 months ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated last year
- ☆13Aug 19, 2015Updated 10 years ago
- A nodejs web application honeypot☆47Aug 23, 2015Updated 10 years ago
- Arduino action air timer for competitive shooting☆10Feb 4, 2023Updated 3 years ago
- ☆20Feb 25, 2026Updated last week
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Aug 12, 2014Updated 11 years ago
- brewpkg☆17Sep 30, 2025Updated 5 months ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- pass export extension☆11Jan 21, 2021Updated 5 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- This is a helm plugin which allows you backup and restore all helm charts between clusters☆10Jun 4, 2023Updated 2 years ago
- A modern, reactive, open source ACI GUI☆18Nov 17, 2016Updated 9 years ago
- A telegram bot meant to provide access to search and download vk.com music☆10Oct 7, 2021Updated 4 years ago
- Godot engine language binding for the wonderful s7 Scheme☆16Jan 3, 2025Updated last year
- ☆13Sep 6, 2023Updated 2 years ago
- ☆12May 2, 2023Updated 2 years ago
- ☆18Jan 26, 2026Updated last month
- ☆10Jun 7, 2020Updated 5 years ago
- Terraform gridscale provider☆15Feb 27, 2026Updated last week
- ☆16Dec 7, 2025Updated 3 months ago
- A Python module that encapsulates access to a Griffin PowerMate USB knob.☆10Dec 15, 2018Updated 7 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 9 months ago
- Radius Server for multifactor authentication (OTP and PUSH). Linux version.☆12Feb 20, 2026Updated 2 weeks ago
- Librados Mailbox☆10Sep 1, 2016Updated 9 years ago
- 🔮 Sıfırdan bir container image OCI layout formatına uygun olarak basit linux komutları olan wc, shasum, mkdir, cat kullanarak yapmak☆11Jun 16, 2022Updated 3 years ago
- p0f git repo - unofficial clone☆15Nov 1, 2012Updated 13 years ago
- Plot pixels on a 320x200 256c canvas☆11Jan 8, 2024Updated 2 years ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 8 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Mar 1, 2026Updated last week
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago