aranya-project / aranyaLinks
Aranya user library, daemon, and policy code
☆190Updated last week
Alternatives and similar repositories for aranya
Users that are interested in aranya are comparing it to the libraries listed below
Sorting:
- Analyze assets authorization, who has access to what and how☆76Updated 8 months ago
- Add a layer of active defense to your cloud applications.☆99Updated last week
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆420Updated last week
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆961Updated 3 weeks ago
- Deep Linux runtime visibility meets Wireshark☆294Updated 2 weeks ago
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆366Updated this week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆98Updated 3 months ago
- VulnRisk - Open Source Vulnerability Risk Assessment Platform☆86Updated last week
- Red Teaming for AI and Cloud☆198Updated last week
- Bitor Scanning Software☆431Updated 3 weeks ago
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆86Updated this week
- ☆75Updated 8 months ago
- An open-source edition of the Aviation Risk Identification and Assessment (ARIA)☆41Updated 5 months ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆407Updated last month
- Validate the isolation posture of your container environment.☆304Updated 3 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 11 months ago
- ☆118Updated this week
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆31Updated 3 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated last week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆148Updated last month
- AxoSyslog - the scalable security data processor☆98Updated this week
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆472Updated 2 weeks ago
- Proximity is a MCP security scanner powered with NOVA☆228Updated 2 months ago
- Scan MCP servers for potential threats & security findings.☆654Updated this week
- ☆32Updated last year
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆177Updated 7 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 9 months ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆229Updated 4 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated 3 years ago