evilsocket / shieldwallLinks
zero-trust remote firewall instrumentation
☆251Updated last year
Alternatives and similar repositories for shieldwall
Users that are interested in shieldwall are comparing it to the libraries listed below
Sorting:
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆86Updated 4 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- A Passive SSH back-end and scanner.☆104Updated 4 months ago
- A fast and secure multi protocol honeypot.☆324Updated 3 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆129Updated last week
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆44Updated 4 years ago
- Create automated tasks and keep an eye on interesting things!☆85Updated 8 months ago
- IntelOwl's Web Interface. Built with Angular 10.☆87Updated 3 years ago
- Import and display Masscan data☆35Updated 6 months ago
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆607Updated last year
- Command line utility for parsing certificates☆66Updated 4 years ago
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆162Updated 2 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- A minimal tool that hides your online assets from online security scanners, researchers and hackers.☆115Updated 5 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Private and self-hosted file sharing over the Tor network written in golang☆119Updated 4 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago
- Secure File Transfer via Global Socket Bounce Network☆25Updated 4 years ago
- Merge multiple pcap files together, gracefully.☆220Updated 4 months ago
- IMAP or SMTP honeypot written in Golang☆25Updated 3 years ago
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆104Updated 3 weeks ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆230Updated 3 years ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated 2 years ago
- Operational Security utility and automator.☆140Updated 5 years ago
- Golang string typosquatting generator☆86Updated 3 months ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆28Updated 7 years ago
- Cross-platform Yara scanner written in Go☆328Updated 2 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆202Updated 5 months ago
- Fast, highly configurable, cloud native dark web crawler.☆95Updated 2 years ago