☆18Feb 2, 2026Updated last month
Alternatives and similar repositories for capiche
Users that are interested in capiche are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated 11 months ago
- ☆46Nov 7, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- ☆42Nov 13, 2025Updated 4 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- ☆86Feb 4, 2026Updated last month
- ☆14Jan 8, 2026Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆113Jan 24, 2026Updated 2 months ago
- ☆28Dec 26, 2025Updated 2 months ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- MCP Bridge is a lightweight, fast, and LLM-agnostic proxy for connecting to multiple Model Context Protocol (MCP) servers through a unifi…☆61Jul 7, 2025Updated 8 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated 11 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 10 months ago
- Windows Event Log "Microsoft-Windows-Partition%4Diagnostic.evtx" parser and devices' VSNs extractor.☆20Nov 28, 2023Updated 2 years ago
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆174Jan 9, 2026Updated 2 months ago
- ☆72Oct 24, 2025Updated 5 months ago
- ☆23Mar 4, 2025Updated last year
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- Collection of all previous 1337UP CTF challenges.☆79Jan 6, 2025Updated last year
- ☆43Jul 17, 2025Updated 8 months ago
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆85Mar 14, 2026Updated last week
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Updated this week
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆129Feb 27, 2026Updated 3 weeks ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated last month