silascutler / dockerhoneypot-logsView external linksLinks
Collection of Docker honeypot logs from 2021 - 2024
☆36Sep 30, 2024Updated last year
Alternatives and similar repositories for dockerhoneypot-logs
Users that are interested in dockerhoneypot-logs are comparing it to the libraries listed below
Sorting:
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- Create honeypots for cloud environments☆110Oct 6, 2025Updated 4 months ago
- ☆75Mar 19, 2025Updated 10 months ago
- ☆22Jul 24, 2025Updated 6 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated 10 months ago
- A library for intercepting system calls☆103Jan 5, 2025Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆30Jan 27, 2026Updated 2 weeks ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆41Sep 16, 2025Updated 4 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 2 months ago
- ☆11Dec 19, 2024Updated last year
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆43Jan 6, 2026Updated last month
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- ☆30Jan 12, 2023Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- ☆18Jan 31, 2025Updated last year
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- ☆51Dec 13, 2025Updated 2 months ago
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Feb 4, 2026Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Jan 2, 2025Updated last year
- ☆18Jul 30, 2024Updated last year
- ☆45Jan 14, 2026Updated last month
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- Chaos Engineering recipes on the Google Cloud Platform☆25Jan 22, 2026Updated 3 weeks ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Jan 2, 2025Updated last year
- ☆13Jan 30, 2025Updated last year
- ☆39Aug 2, 2024Updated last year