aranya-project / aranyaLinks
Aranya user library, daemon, and policy code
☆193Updated this week
Alternatives and similar repositories for aranya
Users that are interested in aranya are comparing it to the libraries listed below
Sorting:
- Analyze assets authorization, who has access to what and how☆76Updated 10 months ago
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆112Updated last month
- Add a layer of active defense to your cloud applications.☆101Updated this week
- Red Teaming for AI and Cloud☆203Updated last month
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆99Updated this week
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆519Updated this week
- ☆75Updated 9 months ago
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆430Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Deep Linux runtime visibility meets Wireshark☆299Updated 2 months ago
- VulnRisk - Open Source Vulnerability Risk Assessment Platform☆123Updated last month
- Proximity is a MCP security scanner powered with NOVA☆269Updated 3 months ago
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆969Updated last week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆154Updated last month
- An open-source knowledge base of defensive countermeasures to protect AI/ML systems. Features interactive views and maps defenses to know…☆115Updated last week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆431Updated 3 months ago
- Bitor Scanning Software☆439Updated 2 months ago
- Validate the isolation posture of your container environment.☆309Updated 3 weeks ago
- Prevent merging of malicious code in pull requests☆252Updated this week
- ☆139Updated this week
- ☆97Updated last month
- Simple ethernet interface traffic monitor and reporting tool☆90Updated last month
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆239Updated 3 weeks ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated last month
- Scan MCP servers for potential threats & security findings.☆742Updated this week
- TuxTape is a DIY toolkit for creating, building, and deploying livepatches for the Linux kernel.☆67Updated 7 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆176Updated 8 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆30Updated 3 weeks ago
- 🤖 Admyral enables continuous control monitoring for any custom control☆336Updated last year
- A toolset for dealing with Cryptography Bill of Materials (CBOM)☆70Updated 3 weeks ago