esell / dockopotamus
A shitty attempt at a honeypot/sandbox that uses docker
☆22Updated 8 years ago
Alternatives and similar repositories for dockopotamus:
Users that are interested in dockopotamus are comparing it to the libraries listed below
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Updated 8 years ago
- A Next Generation Honeypot for a 2016 Oregon State Senior Project☆67Updated 8 years ago
- esh - easy SSH, interact with your SSH server from your local bash☆24Updated 5 years ago
- encrypt and decrypt small files using OpenSSH keys☆70Updated 11 years ago
- DHCP as a FUSE file system☆52Updated 9 years ago
- CLI Personal assistant☆46Updated 7 years ago
- Jump-box shell for Docker - secure remote ssh into containers with ACL☆26Updated 8 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆59Updated 8 years ago
- GPG encrypting MDA☆15Updated 2 years ago
- A lightweight, self-hosted and API-based file upload server supporting YubiKey OTP authentication.☆23Updated 4 years ago
- A fast SSL/TLS reconnaisance tool written in Go☆59Updated 8 years ago
- Connect a browser to a docker container☆53Updated 8 years ago
- MCVirt - Command line virtual machine management utility☆24Updated 4 years ago
- Reverse proxy for HTTPS services, with SSL verification.☆59Updated last year
- nixarmor is a linux hardening automation project☆64Updated 3 years ago
- Demonstrating that disabling ICC in docker does not block raw packets between containers.☆65Updated 7 years ago
- simple tools for encryption from the command-line☆24Updated 9 years ago
- A more isolated virtualenv☆28Updated 6 years ago
- Wrap mitmproxy around Varnish Cache to get pre- & post-cache view of the traffic flow & modification ability.☆24Updated 8 years ago
- Using serverless functions to provide an API for checking potential passwords against an enormous corpus of passwords leaked from securit…☆113Updated 7 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Scan a list of sites to see which support HTTPS, SPDY/3.1 and HTTP/2☆78Updated 9 years ago
- Programmable Dropbox for secure IoT☆70Updated 7 years ago
- ☆56Updated 7 years ago
- An alternative to traditional task schedulers☆96Updated 7 years ago
- Ad hoc Cluster Monitoring Over SSH☆58Updated 9 years ago
- Boutique SSH keypair generator☆17Updated 8 years ago
- A Linux shell script to improve your privacy online☆83Updated 9 years ago
- Salt recipe to automatically secure sshd (and piss off the NSA)☆16Updated 8 years ago