Synarcs / DNSObeliskLinks
Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data loss. Combines TC, Netfilter, raw socket interception, BPF maps, and ring buffers, runs entirely on eBPF in the Linux kernel. Integrates with deep learning for advanced intelligent EDR
☆32Updated 4 months ago
Alternatives and similar repositories for DNSObelisk
Users that are interested in DNSObelisk are comparing it to the libraries listed below
Sorting:
- ☆97Updated last month
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆99Updated 5 months ago
- ☆31Updated this week
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆69Updated 3 months ago
- ☆75Updated 9 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Updated 9 months ago
- ☆53Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated 9 months ago
- ☆85Updated last week
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆103Updated 2 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆30Updated 3 weeks ago
- Knowledge Report Alert & Normalization Generator☆26Updated 3 weeks ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆59Updated 11 months ago
- A tool for folks who `git clone` first and ask questions later☆65Updated 3 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Add a layer of active defense to your cloud applications.☆101Updated last week
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- VulnCheck's official command line tool☆145Updated 2 weeks ago
- ☆29Updated 2 weeks ago
- ☆47Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Pentester-focused Docker registry tool to enumerate and pull images☆37Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- Helm charts for running open source digital forensic tools in Kubernetes☆176Updated this week
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Updated 2 months ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated 2 years ago
- Create honeypots for cloud environments☆109Updated 3 months ago