aranya-project / aranyaView external linksLinks
Aranya user library, daemon, and policy code
☆194Updated this week
Alternatives and similar repositories for aranya
Users that are interested in aranya are comparing it to the libraries listed below
Sorting:
- Core Aranya tech including policy compiler, parser, interface generator, VM, DAG☆17Feb 9, 2026Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- ☆75Mar 19, 2025Updated 10 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Jan 28, 2025Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆242Jul 31, 2024Updated last year
- Add a layer of active defense to your cloud applications.☆103Updated this week
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆809Sep 3, 2024Updated last year
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆87Dec 20, 2024Updated last year
- MikroTik RouterOS Security Inspector☆303Feb 1, 2026Updated 2 weeks ago
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆432Feb 5, 2026Updated last week
- Barcode scanner on a Pico W on micropython, publishing to mqtt☆14Nov 15, 2024Updated last year
- ☆15Jan 29, 2026Updated 2 weeks ago
- AxoSyslog - the scalable security data processor☆102Updated this week
- A module based air quality sensor☆14Jun 7, 2023Updated 2 years ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Feb 4, 2026Updated last week
- Bitor Scanning Software☆453Nov 7, 2025Updated 3 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆224Sep 4, 2024Updated last year
- Validate the isolation posture of your container environment.☆312Updated this week
- Threat-hunting tool for Linux☆1,038Updated this week
- Splunk add-on related to the PurpleLab tool☆41Apr 8, 2024Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆260Nov 22, 2025Updated 2 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆336Aug 7, 2024Updated last year
- Simple SYSLOG client in Go