A general-purpose, high-interaction honeypot that blends old-school Linux internals with new-school containerization to spawn a new trap for hackers upon connection.
☆27Feb 12, 2020Updated 6 years ago
Alternatives and similar repositories for DockerTrap
Users that are interested in DockerTrap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jul 13, 2022Updated 3 years ago
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- ☆19Sep 3, 2021Updated 4 years ago
- Tier0 (Tier Zero) Account discovery for ActiveDirectory Security☆17Apr 11, 2018Updated 7 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- FourDeltaOne Source☆11Apr 20, 2019Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Sentinel Guard - Use to build up Honeypot and Honeynet with ZERO cost easily and simply.☆18Jul 25, 2021Updated 4 years ago
- IoT device scanner.☆41Aug 19, 2019Updated 6 years ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- Displays JSON files in a flat format.☆20Dec 8, 2022Updated 3 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- Create a Word document showing your Sentinel configuration☆14Nov 7, 2023Updated 2 years ago
- AzureLogLibrary - repository used for Azure logging with ARM-templates, scripts, documentation to deploy DCRs, extensions, etc☆14Aug 11, 2023Updated 2 years ago
- ☆45Apr 10, 2024Updated last year
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- MCP Server that integrates with Security Copilot, Sentinel and other tools (in the future). It enhance the process of developing , testin…☆20Oct 8, 2025Updated 5 months ago
- ☆12Jun 24, 2022Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Python Wrapper for the Frantrax API☆17Jan 1, 2026Updated 2 months ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Log4j Exploit Detection Logic for Zeek☆19Nov 25, 2025Updated 4 months ago
- ☆85Nov 21, 2024Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- Apple BLE proximity pairing message spoofing☆23Sep 21, 2023Updated 2 years ago
- ☆17May 27, 2023Updated 2 years ago
- High-performance KV cache storage for LLM inference — GPU offloading, SSD caching, and cross-node sharing via RDMA. Works with vLLM and S…☆27Updated this week
- ☆15May 9, 2023Updated 2 years ago
- Security pentesting/devsecops/bug bounty/Cloud etc.☆20Feb 7, 2024Updated 2 years ago
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆21Jul 29, 2022Updated 3 years ago
- A static page generator in .Net that is PowerShell friendly☆22Aug 24, 2018Updated 7 years ago