Synarcs / DNSObeliskLinks
Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data loss. Combines TC, Netfilter, raw socket interception, BPF maps, and ring buffers, runs entirely on eBPF in the Linux kernel. Integrates with deep learning for advanced intelligent EDR
☆31Updated 3 months ago
Alternatives and similar repositories for DNSObelisk
Users that are interested in DNSObelisk are comparing it to the libraries listed below
Sorting:
- ☆98Updated last week
- Add a layer of active defense to your cloud applications.☆99Updated last week
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- ☆75Updated 8 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆98Updated 3 months ago
- Automated testing, generation & manipulation of #osquery packs☆73Updated last year
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆113Updated last week
- ☆114Updated 3 months ago
- ☆31Updated 5 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- ☆52Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆60Updated 10 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Updated last week
- Red Teaming for AI and Cloud☆198Updated last week
- ☆51Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- ☆85Updated last month
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Updated 2 years ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 11 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆29Updated this week
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆73Updated 2 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆67Updated 2 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Updated 8 months ago
- Security Alert Decoration☆27Updated 4 months ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 8 months ago
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 9 months ago
- A recon tool for GCP Service Account Keys that requires no permissions☆25Updated 7 months ago
- Validate the isolation posture of your container environment.☆304Updated 3 months ago