A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
☆36Aug 7, 2025Updated 7 months ago
Alternatives and similar repositories for prickly-pete
Users that are interested in prickly-pete are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attempt to make a python based Operating System, it means that we use language feature to provide security instead of using hardware as i…☆10Jul 22, 2016Updated 9 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆39Jan 6, 2015Updated 11 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Docker based high interaction honeypot☆10May 7, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ❄️ Research project for SubFinder core API V2☆34Dec 30, 2018Updated 7 years ago
- Manage Splunk Agents and Servers☆16Jul 16, 2025Updated 8 months ago
- Write you a home page with bookmarks well-organized.☆16Aug 25, 2017Updated 8 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Aerial platform for Recon, Intelligence and Pentesting. #R-KALI #Porunga☆16Aug 28, 2018Updated 7 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Docker based honeypot (Dionaea & Kippo)☆26Mar 21, 2015Updated 11 years ago
- A tiny local development DNS server that dynamically updates DNS records based on Docker container events.☆53May 8, 2016Updated 9 years ago
- A platform to help security researchers develop and test machine learning-based security services based on time-series data, with the abi…☆18Apr 9, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CVE-2017-13156-Janus复现☆13Sep 7, 2020Updated 5 years ago
- [DEPRECATED] A quickstart demo for Kolide tools☆52May 29, 2018Updated 7 years ago
- A Chrome extension that provides a minimal New Tab page☆10Mar 2, 2017Updated 9 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- For FUN! Use at your own risk. No warranties, no exceptions.☆19Dec 8, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- a directory history mechanism for the shell.☆11Dec 20, 2018Updated 7 years ago
- Use websockets with twisteds ProcessProtocol☆22Apr 11, 2016Updated 9 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- simple PE parser☆12Mar 14, 2017Updated 9 years ago
- 网络安全开源图书三部曲☆18Jan 3, 2026Updated 2 months ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆20Sep 16, 2013Updated 12 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Jun 19, 2019Updated 6 years ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Mar 11, 2014Updated 12 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- SecurityTube Hack of the Day☆17Apr 2, 2013Updated 12 years ago
- 伪装微信版本,解决微信弹窗"当前客户端版本过低,请前往 应用商店升级到最新版本客户端后再登录"☆23Apr 18, 2025Updated 11 months ago
- A lightweight, automatic dotfile manager☆11Dec 8, 2016Updated 9 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 11 months ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 12 years ago