Synarcs / DNSObeliskLinks
Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data loss. Combines TC, Netfilter, raw socket interception, BPF maps, and ring buffers, runs entirely on eBPF in the Linux kernel. Integrates with deep learning for advanced intelligent EDR
☆30Updated last month
Alternatives and similar repositories for DNSObelisk
Users that are interested in DNSObelisk are comparing it to the libraries listed below
Sorting:
- Tool for obfuscating and deobfuscating data.☆72Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Updated 2 months ago
- ☆94Updated last week
- ☆31Updated 3 months ago
- ☆75Updated 6 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆91Updated 2 months ago
- ☆50Updated 11 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆57Updated 8 months ago
- ☆44Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Updated 10 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated 2 years ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆28Updated this week
- Add a layer of active defense to your cloud applications.☆95Updated last week
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 11 months ago
- Red Teaming for AI and Cloud☆197Updated 4 months ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆89Updated 2 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆111Updated last month
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- ☆47Updated 11 months ago
- ☆84Updated 3 months ago
- ☆28Updated 2 weeks ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Updated 3 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆72Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 6 months ago
- AWS honey token manager☆88Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 11 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- ☆97Updated 2 months ago
- ☆114Updated last month