referefref / modpot
Modular web-application honeypot platform built using go and gin
☆57Updated 11 months ago
Alternatives and similar repositories for modpot:
Users that are interested in modpot are comparing it to the libraries listed below
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆23Updated 3 months ago
- Hijack a slack bot to phish your way in☆55Updated last week
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 5 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Nuclei plugins to audit Chrome extensions☆64Updated 9 months ago
- Autonomous AI C2☆30Updated 8 months ago
- Signature based honeypot detector tool written in Golang☆89Updated 3 weeks ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 4 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆21Updated last month
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 6 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 6 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆68Updated 9 months ago
- ☆16Updated 5 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated last year
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆46Updated 8 months ago
- Security tool against dependency typosquatting attacks☆39Updated this week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆52Updated last month
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆105Updated 5 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated 11 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 6 months ago
- ☆34Updated 8 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- ☆136Updated last month
- ☆21Updated last month
- ☆110Updated last year
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago