qeeqbox / chameleonView external linksLinks
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
☆826Aug 8, 2023Updated 2 years ago
Alternatives and similar repositories for chameleon
Users that are interested in chameleon are comparing it to the libraries listed below
Sorting:
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆941Dec 3, 2025Updated 2 months ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆308Apr 15, 2024Updated last year
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆192Oct 30, 2022Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Apr 26, 2021Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Custom security distro for remote penetration testing☆55Mar 26, 2021Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Nov 12, 2023Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆212Aug 8, 2023Updated 2 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- ☆46Mar 20, 2021Updated 4 years ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,121Updated this week
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆105Jul 11, 2021Updated 4 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆381Feb 1, 2024Updated 2 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆259Sep 18, 2022Updated 3 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆781Jun 20, 2020Updated 5 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,869Aug 18, 2023Updated 2 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Aug 4, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆720Aug 17, 2021Updated 4 years ago
- NERVE Continuous Vulnerability Scanner☆457Dec 6, 2023Updated 2 years ago
- 🍯 T-Pot - The All In One Multi Honeypot Platform 🐝☆8,756Jan 29, 2026Updated 2 weeks ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆992Oct 7, 2022Updated 3 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆756Jul 17, 2023Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,259Aug 24, 2022Updated 3 years ago
- Advanced Honeypot framework.☆1,304Oct 9, 2023Updated 2 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆202Jul 14, 2021Updated 4 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆259Mar 6, 2025Updated 11 months ago
- A polyglot payload generator☆242Aug 15, 2022Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Jan 24, 2026Updated 2 weeks ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆448Aug 18, 2023Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- Automation for internal Windows Penetrationtest / AD-Security☆3,639Aug 28, 2025Updated 5 months ago
- ☆298Jul 2, 2024Updated last year
- Open source pre-operation C2 server based on python and powershell☆761Jul 6, 2021Updated 4 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆929Nov 11, 2024Updated last year
- Extract credentials from lsass remotely☆2,176Dec 24, 2025Updated last month
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,400Nov 7, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,151Apr 17, 2025Updated 9 months ago