silascutler / dockerhoneypot-logs
Collection of Docker honeypot logs from 2021 - 2024
☆35Updated last month
Related projects ⓘ
Alternatives and complementary repositories for dockerhoneypot-logs
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated last month
- An LLM and OCR based Indicator of Compromise Extraction Tool☆30Updated 7 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆42Updated 3 weeks ago
- Living Off Security Tools☆37Updated 2 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆39Updated 2 months ago
- ☆40Updated 4 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆39Updated 2 months ago
- ☆40Updated 2 months ago
- ☆77Updated 7 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆45Updated last month
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆69Updated 3 weeks ago
- Nuclei plugins to audit Chrome extensions☆64Updated 3 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆62Updated 9 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆26Updated 3 weeks ago
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 9 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆92Updated 11 months ago
- ☆32Updated 2 weeks ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆116Updated 2 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆25Updated 3 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- ☆23Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆46Updated 3 weeks ago
- Qemuno Framework☆23Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆46Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆47Updated 6 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 2 weeks ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆101Updated 6 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆30Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆84Updated last month