Easy to configure Honeypot for Blue Team
โ43Jun 18, 2025Updated 9 months ago
Alternatives and similar repositories for h0neytr4p
Users that are interested in h0neytr4p are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNS logging, detection, ...โ15Mar 5, 2022Updated 4 years ago
- ๐ฅ Everything awesome about web-application firewalls (WAF).โ17Jul 27, 2019Updated 6 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.โ11Jul 9, 2020Updated 5 years ago
- DICOM Honeypotโ28Dec 5, 2025Updated 4 months ago
- IoT and Operational Technology Honeypotโ105Oct 7, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways โข AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.โ16Dec 20, 2018Updated 7 years ago
- Elasticsearch honeypot written in Python with Bottle frameworkโ18Apr 12, 2019Updated 7 years ago
- Sp00fer blog post -โ24Jul 19, 2022Updated 3 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chainโ11Mar 8, 2023Updated 3 years ago
- ๐ค Daily updated translation maps for T-Potโ22Apr 25, 2024Updated last year
- Honeynet Project Static Siteโ20Feb 16, 2026Updated 2 months ago
- Forensics artifacts collectionโ21Jun 18, 2021Updated 4 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sourcesโ13Jun 24, 2018Updated 7 years ago
- This program aims to check active targets by saving screenshots in a project.โ14Jan 9, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial โข AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simpโฆโ51Sep 25, 2017Updated 8 years ago
- ้ป้ญ้ฌผๆไปถโ19Jan 30, 2021Updated 5 years ago
- Tools for analyzing Windows containers and break container's isolationโ33Aug 2, 2022Updated 3 years ago
- A Python based Recon Tool to search for Storage Bucketsโ11Jan 21, 2023Updated 3 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.โ12May 28, 2025Updated 10 months ago
- Ursnif beacon decryptorโ27Mar 20, 2023Updated 3 years ago
- Repository resource threat intelligence for SOCโ10Sep 14, 2018Updated 7 years ago
- A technique for Active Directory domain persistenceโ39May 31, 2023Updated 2 years ago
- โ48Apr 15, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits โข AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code for shelLM toolโ58Jan 28, 2025Updated last year
- the IoT and OT (Operational Technology) Honeypotโ30Mar 16, 2024Updated 2 years ago
- HL7 / FHIR honeypotโ27May 20, 2024Updated last year
- โ18Aug 1, 2022Updated 3 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirectorโ41May 17, 2019Updated 6 years ago
- Identify common attack paths to get Domain Administratorโ21Aug 20, 2019Updated 6 years ago
- โ11Jun 8, 2022Updated 3 years ago
- Spring Boot Actuator (jolokia) XXE/RCEโ23Mar 10, 2019Updated 7 years ago
- โ19Oct 4, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits โข AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Research into COMโ19Jan 25, 2020Updated 6 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitterโ16Dec 9, 2019Updated 6 years ago
- Automated PowerShell installer for *Nix with multi Distro support.โ20Nov 21, 2018Updated 7 years ago
- Autopsy Module to analyze Registry Hivesโ16Feb 18, 2022Updated 4 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.โ21Nov 27, 2016Updated 9 years ago
- Collection of Tools & Techniques for analyzing URLsโ32Oct 1, 2023Updated 2 years ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Templateโ16Aug 19, 2021Updated 4 years ago