dynatrace-oss / koneyView external linksLinks
Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and uses eBPF to detect, log, and forward alerts when your traps have been accessed.
☆84Feb 2, 2026Updated 2 weeks ago
Alternatives and similar repositories for koney
Users that are interested in koney are comparing it to the libraries listed below
Sorting:
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Feb 4, 2026Updated last week
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated last month
- ☆22Jul 24, 2025Updated 6 months ago
- Software Bill of Behaviour: A vendor-supplied profile of runtime behaviors for software, designed to be distributed directly within OCI a…☆48Feb 3, 2026Updated last week
- Deliberately vulnerable web application☆22Jun 18, 2017Updated 8 years ago
- Interactive, dynamic, and realistic LLM honeypots☆73Feb 18, 2025Updated 11 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Dec 18, 2023Updated 2 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- ☆10Jan 31, 2026Updated 2 weeks ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆91May 7, 2024Updated last year
- Getting started guides to deploy the SIGHUP Distribution (SD) in different environments☆15Oct 14, 2025Updated 4 months ago
- 析镜 LensAnalysis是一款基于 Volatility 3 框架的图形化内存取证工具,专为 CTF 竞赛和安全研究设计。☆34Feb 9, 2026Updated last week
- ☆12Jun 10, 2023Updated 2 years ago
- Arduino action air timer for competitive shooting☆10Feb 4, 2023Updated 3 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- ☆20Dec 24, 2025Updated last month
- A modern, reactive, open source ACI GUI☆18Nov 17, 2016Updated 9 years ago
- Librados Mailbox☆10Sep 1, 2016Updated 9 years ago
- This is a helm plugin which allows you backup and restore all helm charts between clusters☆10Jun 4, 2023Updated 2 years ago
- ☆11Dec 28, 2025Updated last month
- ☆10Jun 7, 2020Updated 5 years ago
- ☆12May 2, 2023Updated 2 years ago
- ☆18Jan 26, 2026Updated 3 weeks ago
- OSCAL and Kyverno Policy Demo for AWS☆16Aug 16, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆15Jul 9, 2025Updated 7 months ago
- ☆16Dec 7, 2025Updated 2 months ago
- 🔮 Sıfırdan bir container image OCI layout formatına uygun olarak basit linux komutları olan wc, shasum, mkdir, cat kullanarak yapmak☆11Jun 16, 2022Updated 3 years ago
- Visit https://github.com/ombre-project/ombre☆12Jul 5, 2019Updated 6 years ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 7 months ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 8 months ago
- ☆13Jan 11, 2023Updated 3 years ago
- Get intellisense for Haskell in Kakoune via ghci☆14Jun 20, 2018Updated 7 years ago
- Dark colorscheme with vivid colors for Vim☆12Oct 8, 2024Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Black Hat 2017 - Wi-Fi Direct to Hell☆13Dec 6, 2017Updated 8 years ago
- Web File Manager☆12Aug 21, 2025Updated 5 months ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago