Create honeypots for cloud environments
☆111Oct 6, 2025Updated 5 months ago
Alternatives and similar repositories for honeybee
Users that are interested in honeybee are comparing it to the libraries listed below
Sorting:
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 10 months ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- ☆53Oct 27, 2024Updated last year
- [EXPERIMENTAL] This project is a PoC for a WebAssembly (Wasm) based OpenTelemetry Collector plugins.☆22Feb 18, 2026Updated 2 weeks ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Security Advisories☆35Feb 8, 2026Updated last month
- AuditSphere is a Open Source solution for fileserver monitoring and auditing for windows, linux.☆21Feb 8, 2025Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ☆26Jan 16, 2026Updated last month
- A Python tool to manage GitHub Organizations and perform backup☆21Jan 6, 2026Updated 2 months ago
- Reconnaissance Test for Kubernetes.☆11Aug 13, 2024Updated last year
- ☆75Mar 19, 2025Updated 11 months ago
- some leaked src code for known and unknown malwares☆23Aug 15, 2025Updated 6 months ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- boostsecurityio/poutine☆373Feb 23, 2026Updated last week
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- A Tools For Spoon (https://spooncast.net), to Increase Tap Love, Fans, Viewers Of Fans, Report, and etc.☆10Nov 9, 2022Updated 3 years ago
- A Linkedin Activity date Finder☆66Feb 21, 2026Updated 2 weeks ago
- for tutorial only☆13May 11, 2025Updated 9 months ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- ☆169Sep 30, 2025Updated 5 months ago
- ☆24Jan 26, 2021Updated 5 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- nodejsscan Github Action☆28Nov 11, 2024Updated last year
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆123Aug 20, 2023Updated 2 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- ☆30Sep 1, 2022Updated 3 years ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 3 months ago
- ☆35Dec 21, 2023Updated 2 years ago
- Python tool to check rootkits in Windows kernel☆207Aug 20, 2025Updated 6 months ago