Advanced Honeypot framework.
☆1,301Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for honeytrap
Users that are interested in honeytrap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- an awesome list of honeypot resources☆10,231Apr 1, 2025Updated last year
- A low to medium interaction honeypot.☆472Mar 21, 2024Updated 2 years ago
- Home of the dionaea honeypot☆797Aug 1, 2024Updated last year
- 🍯 T-Pot - The All In One Multi Honeypot Platform 🐝☆9,055Mar 14, 2026Updated last month
- Modern Honey Network☆2,470Nov 30, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ICS/SCADA honeypot☆1,461Updated this week
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆6,276Apr 13, 2026Updated last week
- Modular and decentralised honeypot☆2,834Updated this week
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- Web Application Honeypot☆598Jul 23, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,729Sep 23, 2025Updated 6 months ago
- Super Next generation Advanced Reactive honEypot☆480Jun 10, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Jan 12, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Infection Monkey - An open-source adversary emulation platform☆6,986May 1, 2025Updated 11 months ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 7 years ago
- The Hunting ELK☆3,918Jun 1, 2024Updated last year
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,298Jul 10, 2024Updated last year
- Malicious traffic detection system☆8,380Updated this week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,530Apr 17, 2025Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,683Feb 14, 2024Updated 2 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆1,787Apr 13, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆291Oct 28, 2017Updated 8 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,471Oct 1, 2025Updated 6 months ago
- Six Degrees of Domain Admin☆10,537Mar 2, 2026Updated last month
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,900Jul 25, 2025Updated 8 months ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,231Apr 11, 2026Updated last week
- ☆1,092May 1, 2019Updated 6 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆4,004Apr 12, 2026Updated last week
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,837Jan 19, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An information security preparedness tool to do adversarial simulation.☆1,137Apr 1, 2019Updated 7 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- Kippo - SSH Honeypot☆1,712Nov 19, 2023Updated 2 years ago
- Loki - Simple IOC and YARA Scanner☆3,743Jan 12, 2026Updated 3 months ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Aug 12, 2014Updated 11 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,367Apr 13, 2026Updated last week