☆44Aug 3, 2021Updated 4 years ago
Alternatives and similar repositories for sgxray
Users that are interested in sgxray are comparing it to the libraries listed below
Sorting:
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Phishing Framework for Pentesters☆201May 16, 2023Updated 2 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆208Apr 3, 2025Updated 11 months ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated last year
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358May 31, 2024Updated last year
- High speed/Low cost CommonCrawl RegExp in Node.js☆256Apr 6, 2024Updated last year
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- A Blazing fast Security Auditing tool for Kubernetes☆1,006Apr 6, 2024Updated last year
- The burp extension to forward the request☆10Oct 21, 2024Updated last year
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- The nbench benchmark ported to SGX.☆14Aug 4, 2019Updated 6 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- tshark + ELK analytics virtual machine☆68Jan 31, 2025Updated last year
- ☆16Aug 4, 2023Updated 2 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated this week
- ☆14Oct 27, 2021Updated 4 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Aug 6, 2019Updated 6 years ago
- ☆15Aug 8, 2021Updated 4 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- Simple password-wallet application based on Intel SGX for linux.☆17May 2, 2020Updated 5 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,215Feb 3, 2025Updated last year
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆193Jul 4, 2024Updated last year
- ☆30Updated this week
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- A library and an application to provide migratable primitives for SGX enclaves.☆22Feb 28, 2020Updated 6 years ago
- ☆58Jul 21, 2023Updated 2 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- Making transparency normal!☆24Dec 18, 2023Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Feb 23, 2026Updated last week