aranya-project / aranya
Aranya user library, daemon, and policy code
☆152Updated this week
Alternatives and similar repositories for aranya:
Users that are interested in aranya are comparing it to the libraries listed below
- Add a layer of active defense to your cloud applications.☆86Updated last week
- Core Aranya tech including policy compiler, parser, interface generator, VM, DAG☆13Updated this week
- ☆254Updated last month
- A universal SBOM representation in protocol buffers☆273Updated this week
- Automation tool for Windows Deception Host Burn-In☆80Updated last month
- Validate the isolation posture of your container environment.☆228Updated this week
- Test Software for the Characterization of AI Technologies☆235Updated this week
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆354Updated 3 weeks ago
- Analyze assets authorization, who has access to what and how☆76Updated last month
- Deep Linux runtime visibility meets Wireshark☆255Updated this week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆154Updated 10 months ago
- ☆69Updated 10 months ago
- 🤖 Admyral enables continuous control monitoring for any custom control☆319Updated last month
- Multi-services Asynchronous Honeypot Solution with real-time threat detection☆74Updated this week
- in-toto is a framework to secure the software supply chain.☆70Updated last week
- 💀 Don't fear the Reaper 👻☆440Updated last month
- Customizable SIEM and XDR powered by Real-Time correlation and Threat Intelligence☆229Updated this week
- The Internets #1 Subdomain Takeover Tool☆235Updated last week
- Pen Test Report Generation and Assessment Collaboration☆457Updated last week
- ☆27Updated 2 months ago
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆70Updated 3 months ago
- Chalk allows you to follow code from development, through builds and into production.☆362Updated this week
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆175Updated 3 weeks ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆144Updated last month
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆214Updated 3 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆222Updated 2 years ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆338Updated 11 months ago
- OCSF Documentation☆122Updated last month
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆71Updated 10 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆230Updated this week