Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.
β87Feb 26, 2021Updated 5 years ago
Alternatives and similar repositories for takuan
Users that are interested in takuan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π§ π π€ Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.β244Jun 6, 2022Updated 3 years ago
- zero-trust remote firewall instrumentationβ259Jan 19, 2026Updated 2 months ago
- The Swiss Army knife for backend engineers.β95Mar 12, 2021Updated 5 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host stringβ23Apr 1, 2022Updated 3 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.β¦β15Apr 27, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A small utility that aims to automate and simplify some tasks related to software release cycles.β44Apr 18, 2021Updated 4 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.ioβ17May 8, 2019Updated 6 years ago
- PwnGRID queries for Joeβ18Nov 12, 2019Updated 6 years ago
- A primitive implementation of the Trie data structure in Golang.β13Sep 2, 2018Updated 7 years ago
- Repository of files for independent anti-phishing campaign, trusted information and moreβ10May 14, 2020Updated 5 years ago
- fswatch - Watch for changes in file systemβ12Jun 13, 2019Updated 6 years ago
- Sniper. Passive Secrets Hunting.π¬β13Jun 3, 2022Updated 3 years ago
- A webpage monitor bot, currently used to monitor Twitter ToS.β19Nov 10, 2022Updated 3 years ago
- A GNU/Linux monitoring and profiling tool focused on single processes.β674Nov 14, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- π¦ Prometheus exporter for pcap metricsβ16Feb 15, 2023Updated 3 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048βs patchβ14Aug 11, 2020Updated 5 years ago
- Quijote is an highly configurable HTTP middleware for API security.β47Feb 10, 2021Updated 5 years ago
- Simplified NAT Slipstream server and clientβ22Dec 4, 2020Updated 5 years ago
- Secrets detection based on regular expressions.β22Apr 15, 2025Updated 11 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research teaβ¦β20Sep 22, 2021Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElkβ52Oct 6, 2020Updated 5 years ago
- decrypt rdp credentials to password using mimikatz.β28Dec 18, 2020Updated 5 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befoβ¦β14Aug 31, 2021Updated 4 years ago
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A machine learning based GitHub bot for Issues.β14Dec 6, 2018Updated 7 years ago
- A tiny set of helper scripts for ipinfoβ17Aug 7, 2020Updated 5 years ago
- The OWASP Amass Homebrew Formulaβ17Jul 13, 2025Updated 8 months ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.β229Aug 19, 2022Updated 3 years ago
- A fully featured Windows backdoor that uses email as a C&C serverβ16Aug 19, 2017Updated 8 years ago
- Validate proxies for specific domainβ39Aug 14, 2021Updated 4 years ago
- A TOTP based port knocking service. Every time slot, it generates a sequence of ports that must be knocked (in a correct order) before thβ¦β31May 6, 2021Updated 4 years ago
- β‘οΈ Extensions, integrations, and wrappers for Uber's Zap logging libraryβ13May 9, 2020Updated 5 years ago
- Python Backdoor Obfusctor, Encrypter and Encoderβ18Nov 5, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Enumerate a target Based off of Nmap Resultsβ76Oct 25, 2023Updated 2 years ago
- Serialize ngraph.graph to binary formatβ10Oct 9, 2025Updated 5 months ago
- W3C Standards Vulnerability Disclosure & Handling Process and Policyβ25Jan 14, 2026Updated 2 months ago
- Core bypass Windows Defender and execute any binary converted to shellcodeβ44Oct 12, 2021Updated 4 years ago
- Find cloud assets that no one wants exposed π βοΈβ347Jul 20, 2020Updated 5 years ago
- Database interaction layer to store the Open Asset Model in a database management systemβ22Mar 17, 2026Updated last week
- Robo-Red-Team: Training platform for blue team cybersecurity professionalsβ51Mar 6, 2021Updated 5 years ago