philcryer / prickly-peteView external linksLinks
A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
☆36Aug 7, 2025Updated 6 months ago
Alternatives and similar repositories for prickly-pete
Users that are interested in prickly-pete are comparing it to the libraries listed below
Sorting:
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Attempt to make a python based Operating System, it means that we use language feature to provide security instead of using hardware as i…☆10Jul 22, 2016Updated 9 years ago
- This cookbook installs Nexpose☆12Dec 15, 2023Updated 2 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆39Jan 6, 2015Updated 11 years ago
- Manage Splunk Agents and Servers☆16Jul 16, 2025Updated 6 months ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 11 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- Honeypot repo☆48Aug 10, 2015Updated 10 years ago
- [ABANDONED] A Docker container running Suricata and the ELK stack.☆21Jan 27, 2016Updated 10 years ago
- Pretty awesome command-line client for public SSLLabs API☆20Feb 2, 2026Updated last week
- Mattermost - Shodan Slash command☆31Jan 25, 2017Updated 9 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 11 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Jun 19, 2019Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- Visualisation of ulogd / ufw / iptables data☆39Dec 3, 2014Updated 11 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Nov 22, 2022Updated 3 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Docker based honeypot (Dionaea & Kippo)☆26Mar 21, 2015Updated 10 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 9 years ago
- Puppet module for Auditd☆41Jan 26, 2021Updated 5 years ago
- CSV converter to TAO QTI Package☆12Mar 23, 2020Updated 5 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- The FOSS-Cloud webinterface.☆14Aug 25, 2017Updated 8 years ago
- Tenable.io SDK offers a scalable and safe way to integrate with the Tenable.io platform.☆83Mar 3, 2020Updated 5 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 2 years ago
- ☆16May 13, 2021Updated 4 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- A Reverse Incremental Backup Script for RClone with support for Windows/Linux/Mac with Volume Shadow Copy (VSS) and email report.☆12Feb 3, 2020Updated 6 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Mar 20, 2019Updated 6 years ago