Create honeypots for cloud environments
☆114Oct 6, 2025Updated 7 months ago
Alternatives and similar repositories for honeybee
Users that are interested in honeybee are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- ☆54Oct 27, 2024Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- A Python tool to manage GitHub Organizations and perform backup☆21Mar 26, 2026Updated last month
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AuditSphere is a Open Source solution for fileserver monitoring and auditing for windows, linux.☆23Feb 8, 2025Updated last year
- ☆75Mar 19, 2025Updated last year
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- A GitHub Actions Supply Chain CTF / Goat☆27Apr 13, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆18Jun 25, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆56May 7, 2025Updated last year
- A collection of documented and undocumented AWS API models☆54Nov 21, 2025Updated 5 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- poutine, a supply chain vulnerability scanner for build pipelines☆446Updated this week
- An open-source collection of API key rotation tutorials.☆83May 1, 2026Updated last week
- ☆28Jan 16, 2026Updated 3 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆337Apr 8, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 7 months ago
- Data about all known supply-chain attacks through history☆66May 28, 2025Updated 11 months ago
- An AI-backed threat hunting assistant that aligns to the PEAK framework.☆41Apr 27, 2026Updated last week
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- ☆170Sep 30, 2025Updated 7 months ago
- ☆61Oct 24, 2025Updated 6 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 10 months ago
- Repo to hold wazuh manager mcp server☆81Apr 15, 2026Updated 3 weeks ago
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Mar 20, 2026Updated last month
- ☆20Apr 10, 2025Updated last year
- ExportHider: Generating Export Table during Runtime to Hide the Exported Functions from the DLL File.☆31Apr 12, 2026Updated 3 weeks ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆63Feb 5, 2025Updated last year