Easy to configure Honeypot for Blue Team
β43Jun 18, 2025Updated 9 months ago
Alternatives and similar repositories for h0neytr4p
Users that are interested in h0neytr4p are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNS logging, detection, ...β15Mar 5, 2022Updated 4 years ago
- π₯ Everything awesome about web-application firewalls (WAF).β17Jul 27, 2019Updated 6 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.β11Jul 9, 2020Updated 5 years ago
- DICOM Honeypotβ27Dec 5, 2025Updated 3 months ago
- IoT and Operational Technology Honeypotβ105Oct 7, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.β17Dec 20, 2018Updated 7 years ago
- Elasticsearch honeypot written in Python with Bottle frameworkβ18Apr 12, 2019Updated 6 years ago
- Collaborative pentest tool with highly customizable toolsβ73Jan 6, 2022Updated 4 years ago
- π€ Daily updated translation maps for T-Potβ22Apr 25, 2024Updated last year
- Honeynet Project Static Siteβ20Feb 16, 2026Updated last month
- Forensics artifacts collectionβ21Jun 18, 2021Updated 4 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sourcesβ13Jun 24, 2018Updated 7 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.β24Mar 1, 2019Updated 7 years ago
- This program aims to check active targets by saving screenshots in a project.β14Jan 9, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simpβ¦β51Sep 25, 2017Updated 8 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest APIβ52Sep 30, 2022Updated 3 years ago
- Ursnif beacon decryptorβ27Mar 20, 2023Updated 3 years ago
- Repository resource threat intelligence for SOCβ10Sep 14, 2018Updated 7 years ago
- A technique for Active Directory domain persistenceβ39May 31, 2023Updated 2 years ago
- Code for shelLM toolβ57Jan 28, 2025Updated last year
- the IoT and OT (Operational Technology) Honeypotβ30Mar 16, 2024Updated 2 years ago
- This is a quick hack of a honeypot web server that serves an infinite web page. It is meant to fill the hard disk of the attacker when itβ¦β21Apr 7, 2015Updated 10 years ago
- HL7 / FHIR honeypotβ26May 20, 2024Updated last year
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- β18Aug 1, 2022Updated 3 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirectorβ41May 17, 2019Updated 6 years ago
- Identify common attack paths to get Domain Administratorβ21Aug 20, 2019Updated 6 years ago
- β11Jun 8, 2022Updated 3 years ago
- Spring Boot Actuator (jolokia) XXE/RCEβ23Mar 10, 2019Updated 7 years ago
- Dump Lsass Memory Using a Reflective Dllβ14Feb 4, 2022Updated 4 years ago
- β19Oct 4, 2021Updated 4 years ago
- β12Oct 16, 2017Updated 8 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitterβ16Dec 9, 2019Updated 6 years ago
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Autopsy Module to analyze Registry Hivesβ16Feb 18, 2022Updated 4 years ago
- Web Application for domain name monitoring / alertingβ65Aug 1, 2024Updated last year
- Collection of Tools & Techniques for analyzing URLsβ33Oct 1, 2023Updated 2 years ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Templateβ16Aug 19, 2021Updated 4 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is baseβ¦β38Dec 12, 2022Updated 3 years ago
- A quick reference script that can easily display reverse shells for different languages.β20May 28, 2020Updated 5 years ago
- This project reads data from a csv(MS Excel) file containing numeric data and then stores it into a 2D array in C++;β10Mar 13, 2017Updated 9 years ago