silascutler / dockerhoneypot-logs
Collection of Docker honeypot logs from 2021 - 2024
☆35Updated last month
Related projects ⓘ
Alternatives and complementary repositories for dockerhoneypot-logs
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated last month
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆43Updated last month
- Create tar/zip archives that try to exploit zipslip vulnerability.☆45Updated 2 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 10 months ago
- ☆38Updated 5 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆27Updated last month
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆39Updated 3 months ago
- Living Off Security Tools☆41Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆40Updated 2 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 3 weeks ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆48Updated 8 months ago
- ☆40Updated 2 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆39Updated 11 months ago
- https://lolad-project.github.io/☆62Updated 2 weeks ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆69Updated last month
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆92Updated 11 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆107Updated 2 months ago
- ☆32Updated last week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆46Updated last month
- C2 Active Scanner☆48Updated 5 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆44Updated this week
- A GitHub Actions Supply Chain CTF / Goat☆17Updated 5 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆87Updated last week
- ☆29Updated last month
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated 2 weeks ago
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 2 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 5 months ago