Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and uses eBPF to detect, log, and forward alerts when your traps have been accessed.
☆88Mar 19, 2026Updated last week
Alternatives and similar repositories for koney
Users that are interested in koney are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆34Updated this week
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 2 months ago
- Software Bill of Behaviour: A vendor-supplied profile of runtime behaviors for software, designed to be distributed directly within OCI a…☆51Mar 19, 2026Updated last week
- ☆12May 2, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Jun 21, 2017Updated 8 years ago
- ☆12Feb 5, 2026Updated last month
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆55Mar 15, 2026Updated 2 weeks ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Sep 19, 2023Updated 2 years ago
- iximiuz Labs' playground build tools and bake recipes☆28Feb 16, 2026Updated last month
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- Tool for creating Git Releases using Conventional Commits and Pull/Merge Requests☆21Feb 10, 2026Updated last month
- Deliberately vulnerable web application☆22Jun 18, 2017Updated 8 years ago
- Red Hat CloudForms installed in fully automated and repeatable fashion on your laptop. Get started with your containerized Cloud operatio…☆18Jun 26, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated last year
- ☆10Jan 31, 2026Updated last month
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- ☆21Jun 29, 2020Updated 5 years ago
- Kubescape eBPF agent 🥷🏻☆30Updated this week
- AWS Service Broker documentation☆39Mar 7, 2019Updated 7 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆13Aug 19, 2015Updated 10 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 4 months ago
- ☆27Jun 5, 2025Updated 9 months ago
- Plot pixels on a 320x200 256c canvas☆11Jan 8, 2024Updated 2 years ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Mar 22, 2026Updated last week
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 9 months ago
- playing around with ELF in zig☆13May 23, 2021Updated 4 years ago
- OSCAL and Kyverno Policy Demo for AWS☆16Aug 16, 2023Updated 2 years ago
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆37Mar 23, 2023Updated 3 years ago
- ☆10Jun 7, 2020Updated 5 years ago
- A simple CLI for combining json and yaml files☆19Nov 14, 2023Updated 2 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- Helm plugin to fetch all possible images from the chart before deployment or from a deployed release☆103Nov 20, 2025Updated 4 months ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Aug 12, 2014Updated 11 years ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago