Modular web-application honeypot platform built using go and gin
☆63May 8, 2024Updated 2 years ago
Alternatives and similar repositories for modpot
Users that are interested in modpot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆24Apr 27, 2026Updated 3 weeks ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Mar 1, 2024Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆111Mar 22, 2025Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated 3 weeks ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆52Nov 16, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆117Aug 9, 2024Updated last year
- ☆24Mar 4, 2025Updated last year
- Galah: An LLM-powered web honeypot.☆644Jul 24, 2025Updated 9 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 5 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆56May 7, 2025Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36May 12, 2026Updated last week
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 7 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- self-hosted Azure OSINT tool☆35Jun 24, 2025Updated 10 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 4 months ago
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆112Jan 4, 2024Updated 2 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated 2 years ago
- ☆11Dec 19, 2024Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆101Oct 15, 2025Updated 7 months ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 10 months ago
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆184Apr 17, 2026Updated last month
- Nuclei plugins to audit Chrome extensions☆65Jul 16, 2024Updated last year
- Powershell SMBv3 Compression checker☆28Apr 1, 2023Updated 3 years ago
- ☆57Dec 13, 2025Updated 5 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 3 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆53Jan 16, 2026Updated 4 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆57Apr 20, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Customized CVE FEED Notifier☆113Apr 22, 2025Updated last year
- Canary Detection☆195Oct 20, 2025Updated 7 months ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Cervantes plataform docker repository☆16Aug 6, 2025Updated 9 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆71Apr 30, 2026Updated 2 weeks ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year