silascutler / dockerhoneypot-logs
Collection of Docker honeypot logs from 2021 - 2024
☆36Updated 5 months ago
Alternatives and similar repositories for dockerhoneypot-logs:
Users that are interested in dockerhoneypot-logs are comparing it to the libraries listed below
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 5 months ago
- Living Off Security Tools☆45Updated 4 months ago
- ☆16Updated 3 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆37Updated 2 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆42Updated 2 months ago
- Hijack a slack bot to phish your way in☆53Updated 2 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆74Updated 4 months ago
- Mapping of open-source detection rules and atomic tests.☆126Updated last month
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆66Updated last week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 2 months ago
- ☆40Updated 6 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 5 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 4 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- ☆78Updated 10 months ago
- https://lolad-project.github.io/☆71Updated 2 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆34Updated last month
- ☆24Updated 2 years ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆47Updated 10 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago
- Examine Chrome extensions for security issues☆75Updated last week
- Rules shared by the community from 100 Days of YARA 2025☆29Updated last month