Easy to configure Honeypot for Blue Team
☆43Jun 18, 2025Updated 8 months ago
Alternatives and similar repositories for h0neytr4p
Users that are interested in h0neytr4p are comparing it to the libraries listed below
Sorting:
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- DICOM Honeypot☆27Dec 5, 2025Updated 3 months ago
- Honeynet Project Static Site☆19Feb 16, 2026Updated 2 weeks ago
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 9 months ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Dec 20, 2018Updated 7 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 6 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- ☆48Apr 15, 2022Updated 3 years ago
- Tools for analyzing Windows containers and break container's isolation☆32Aug 2, 2022Updated 3 years ago
- 黑魔鬼插件☆19Jan 30, 2021Updated 5 years ago
- 🤖 Daily updated translation maps for T-Pot☆22Apr 25, 2024Updated last year
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Sep 30, 2022Updated 3 years ago
- Bypassing AppLocker with C#☆144Jul 7, 2021Updated 4 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆112Feb 8, 2025Updated last year
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 7 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆28Nov 14, 2022Updated 3 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- HL7 / FHIR honeypot☆26May 20, 2024Updated last year
- Industrial Hacking Simulator☆27Feb 21, 2026Updated last week
- Rodan Exploitation Framework☆103Dec 1, 2025Updated 3 months ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Jun 8, 2017Updated 8 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- ☆31Oct 14, 2025Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆128Apr 6, 2024Updated last year
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Some handy bash scripts I used for the OSCP☆24Oct 1, 2022Updated 3 years ago