referefref / modpot
Modular web-application honeypot platform built using go and gin
☆56Updated 10 months ago
Alternatives and similar repositories for modpot:
Users that are interested in modpot are comparing it to the libraries listed below
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Signature based honeypot detector tool written in Golang☆89Updated last week
- Semgrep-based Policy Controller for Kubernetes☆47Updated last week
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 5 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 8 months ago
- Hijack a slack bot to phish your way in☆55Updated 3 months ago
- Tool for obfuscating and deobfuscating data.☆69Updated last year
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆37Updated last week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 4 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆36Updated 4 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆51Updated last week
- ☆32Updated 7 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated 10 months ago
- Distributed network and vulnerability scanner☆46Updated last year
- Automation tool for Windows Deception Host Burn-In☆83Updated 3 months ago
- Do bulk whois lookups and get alerted on domains of interest.☆34Updated 7 months ago
- Find what egress ports are allowed☆39Updated 2 years ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 6 months ago
- A home for detection content developed by the delivr.to team☆67Updated last month
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 3 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 9 months ago
- ☆110Updated last year
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago