evilsocket / shieldwallLinks
zero-trust remote firewall instrumentation
☆255Updated 2 weeks ago
Alternatives and similar repositories for shieldwall
Users that are interested in shieldwall are comparing it to the libraries listed below
Sorting:
- The Swiss Army knife for backend engineers.☆95Updated 4 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆86Updated 4 years ago
- A fast and secure multi protocol honeypot.☆326Updated 3 years ago
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- A minimal tool that hides your online assets from online security scanners, researchers and hackers.☆117Updated 5 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆44Updated 4 years ago
- Create automated tasks and keep an eye on interesting things!☆87Updated last month
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆136Updated last week
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆609Updated last year
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆228Updated 3 years ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆162Updated 3 years ago
- IntelOwl's Web Interface. Built with Angular 10.☆86Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- Analyse binaries for missing security features, information disclosure and more...☆87Updated 2 years ago
- Command line utility for parsing certificates☆67Updated 4 years ago
- Operational Security utility and automator.☆142Updated 5 years ago
- Wipe, reinstall or restore your system from running GNU/Linux distribution. Via SSH, without rebooting.☆281Updated last year
- Import and display Masscan data☆35Updated 9 months ago
- Golang string typosquatting generator☆86Updated 6 months ago
- Yet Another Fake Honeypot written in Go☆10Updated 8 years ago
- Fast, highly configurable, cloud native dark web crawler.☆95Updated 2 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆74Updated 2 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- A tool to extract useful data from documents☆154Updated last year
- Pivoting Frontend for Pre-Seeded Password Databases☆134Updated 2 months ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago