A general-purpose, high-interaction honeypot that blends old-school Linux internals with new-school containerization to spawn a new trap for hackers upon connection.
☆27Feb 12, 2020Updated 6 years ago
Alternatives and similar repositories for DockerTrap
Users that are interested in DockerTrap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆15Updated this week
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- ☆19Sep 3, 2021Updated 4 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python based 32-bit Windows debugger built for learning purposes. Currently includes breakpoint setting, register modification, process m…☆13Jun 24, 2020Updated 5 years ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- obfuscate your c++ code with an external text file!☆10Nov 19, 2014Updated 11 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- The repository contains Criminal IP Asset Search data in STIX 2.1 JSON format, enabling a quick understanding of threat information for s…☆12Jan 29, 2024Updated 2 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Sentinel Guard - Use to build up Honeypot and Honeynet with ZERO cost easily and simply.☆18Jul 25, 2021Updated 4 years ago
- Displays JSON files in a flat format.☆20Dec 8, 2022Updated 3 years ago
- Reference implementation of a Stealthwatch Data Exporter☆13Sep 19, 2024Updated last year
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- 🌎 a small server that returns the location of a given IP address☆16Feb 10, 2014Updated 12 years ago
- Create a Word document showing your Sentinel configuration☆14Nov 7, 2023Updated 2 years ago
- Font Awesome for Django☆12Dec 27, 2021Updated 4 years ago
- AzureLogLibrary - repository used for Azure logging with ARM-templates, scripts, documentation to deploy DCRs, extensions, etc☆14Aug 11, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆45Apr 10, 2024Updated 2 years ago
- Apple BLE proximity pairing message spoofing☆13Oct 8, 2023Updated 2 years ago
- A tutorial for low-level C++ linkage, meant for people with 0 C++ knowledge☆23Apr 25, 2023Updated 3 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- This repository contains the companion code from the "All your tracing are belong to BPF" blog posts☆19Apr 12, 2023Updated 3 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- ☆10Jun 11, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- ☆84Nov 21, 2024Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- ☆14Mar 5, 2021Updated 5 years ago