Collection of Docker honeypot logs from 2021 - 2024
☆36Sep 30, 2024Updated last year
Alternatives and similar repositories for dockerhoneypot-logs
Users that are interested in dockerhoneypot-logs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- A library for intercepting system calls☆103Jan 5, 2025Updated last year
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆33Jan 27, 2026Updated 2 months ago
- ☆75Mar 19, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆51Mar 10, 2025Updated last year
- Create honeypots for cloud environments☆114Oct 6, 2025Updated 6 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆25Dec 28, 2025Updated 3 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆336Apr 8, 2026Updated last week
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- ☆22Updated this week
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated last year
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆45Updated this week
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 7 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆48Apr 10, 2026Updated last week
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆35Apr 10, 2026Updated last week
- Chaos Engineering recipes on the Google Cloud Platform☆28Apr 2, 2026Updated 2 weeks ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Updated this week
- Using this model, BigMart will try to understand the properties of products and stores which play a key role in increasing sales.☆10Jun 2, 2024Updated last year
- ☆49Mar 21, 2023Updated 3 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 11 months ago
- ☆170Sep 30, 2025Updated 6 months ago
- ☆18Jul 30, 2024Updated last year
- ☆89Mar 5, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Data about all known supply-chain attacks through history☆65May 28, 2025Updated 10 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Apr 1, 2026Updated 2 weeks ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆118Oct 29, 2024Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆85Apr 7, 2026Updated last week
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- An AI-backed threat hunting assistant that aligns to the PEAK framework.☆39Updated this week