Aranya user library, daemon, and policy code
☆194Apr 2, 2026Updated last week
Alternatives and similar repositories for aranya
Users that are interested in aranya are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆133Jan 28, 2025Updated last year
- Add a layer of active defense to your cloud applications.☆105Apr 2, 2026Updated last week
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago
- Barcode scanner on a Pico W on micropython, publishing to mqtt☆14Nov 15, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Chalk allows you to follow code from development, through builds and into production.☆430Updated this week
- Splunk add-on related to the PurpleLab tool☆41Apr 8, 2024Updated 2 years ago
- Threat-hunting tool for Linux☆1,050Updated this week
- A multi-vault secret injection tool for safely injecting secrets into app environment☆133Mar 2, 2026Updated last month
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆813Sep 3, 2024Updated last year
- MikroTik RouterOS Security Inspector☆308Feb 1, 2026Updated 2 months ago
- Bitor Scanning Software☆458Nov 7, 2025Updated 5 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆440Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆88Dec 20, 2024Updated last year
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆470Jan 31, 2024Updated 2 years ago
- Open-source security automation platform for teams and AI agents☆3,544Updated this week
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆592Oct 23, 2025Updated 5 months ago
- A Notepad-like simple text editor where files are saved (and later loaded) encrypted with AES-256.☆98Jan 6, 2026Updated 3 months ago
- ☆18Aug 17, 2025Updated 7 months ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆16Jan 8, 2019Updated 7 years ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,232Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The useful exploit finder☆827Jan 19, 2026Updated 2 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆266Nov 22, 2025Updated 4 months ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Prevent merging of malicious code in pull requests☆255Jan 8, 2026Updated 3 months ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 10 months ago
- mTLS with PKCS11 keys☆17Sep 16, 2025Updated 6 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆696Jan 6, 2026Updated 3 months ago
- ☆22Jun 1, 2018Updated 7 years ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆337Aug 7, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SSHamble: Unexpected Exposures in SSH☆1,182Feb 16, 2026Updated last month
- A module based air quality sensor☆14Jun 7, 2023Updated 2 years ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆227Sep 4, 2024Updated last year
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated 11 months ago
- Lambda function that streamlines containment of an AWS account compromise☆344Dec 1, 2023Updated 2 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 3 months ago