egrets monitors egress
☆47Apr 12, 2020Updated 5 years ago
Alternatives and similar repositories for egrets
Users that are interested in egrets are comparing it to the libraries listed below
Sorting:
- A host monitoring proof of concept that uses python and ebpf to watch for bad behavior and optionally take action on it.☆12Jul 14, 2019Updated 6 years ago
- ☆41Apr 5, 2025Updated 11 months ago
- ☆33Feb 26, 2022Updated 4 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- ℁ Retrieve your external IP address via DNS☆16Mar 3, 2023Updated 3 years ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- 💅🏽 analyzes your github actions☆99Feb 9, 2026Updated last month
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 3 years ago
- A simple self-hostable service, kinda like imgur☆14Apr 18, 2020Updated 5 years ago
- Manage your own Git server from the command line☆14May 18, 2018Updated 7 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated 2 months ago
- Linux uhid api in Go.☆12Sep 27, 2023Updated 2 years ago
- Set of scripts to create your own CA using hashicorp Vault☆18Jan 15, 2021Updated 5 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- An easy way to give all your EC2 instances SSH host certificates☆16Feb 25, 2023Updated 3 years ago
- BalanceD is a Layer-4 Linux Virtual Server (LVS) based load balancing platform for Kubernetes.☆43Dec 6, 2019Updated 6 years ago
- Files for http://deniable.org/windows/windows-callbacks☆26Jul 9, 2020Updated 5 years ago
- ANSI Bash Function Library☆16Mar 8, 2016Updated 10 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Crowdstrike response script containing various functions for IR/triage☆12Dec 7, 2020Updated 5 years ago
- curl for websockets☆30Mar 14, 2016Updated 10 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Mar 8, 2026Updated 2 weeks ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Jul 20, 2022Updated 3 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Hallow is a SSH Certificate Authority designed for use with AWS native environments☆65Jul 5, 2024Updated last year
- Show diff between 2 gem versions☆14Feb 12, 2019Updated 7 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- A graphical user interface for Magic Wormhole file transfer☆13May 17, 2022Updated 3 years ago
- ☆11Feb 14, 2025Updated last year