Small container runtime for threat detection
☆14Apr 13, 2025Updated last year
Alternatives and similar repositories for confine
Users that are interested in confine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- Minimal network simulator using Docker and netem. Licensed under EUPLv1.1☆16Aug 22, 2017Updated 8 years ago
- Minimal and persistent key-value store designed with security in mind☆43Jan 16, 2023Updated 3 years ago
- Inexpensive, reliable, dynamic DNS over IRC☆16Jun 29, 2021Updated 4 years ago
- low-level bindings to libseccomp☆12Mar 6, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Jun 12, 2024Updated last year
- CryptGuard is a comprehensive cryptographic library, offering robust encryption and decryption capabilities. It integrates traditional cr…☆21Sep 23, 2025Updated 6 months ago
- Raccolta di flags e writeup delle challenge presenti su https://training.olicyber.it/challenges☆18Feb 26, 2023Updated 3 years ago
- Run ebpf programs in docker (e.g., bpftrace)☆27Oct 6, 2022Updated 3 years ago
- Connect to Cabal using an IRC client.☆18Dec 7, 2019Updated 6 years ago
- force-bind with seccomp-bpf notifications☆17Dec 14, 2023Updated 2 years ago
- FreeBSD to hardenedBSD up to date conversion☆14Dec 24, 2019Updated 6 years ago
- Simple seccomp library for rust☆22Sep 28, 2023Updated 2 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆11Feb 9, 2023Updated 3 years ago
- A PoC packer written in Rust!☆74Apr 1, 2022Updated 4 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Binary (In)security tool☆25May 27, 2024Updated last year
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆12Dec 26, 2022Updated 3 years ago
- Kubernetes Operator for Redis cluster based on Undermoon☆28Feb 11, 2023Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ETHICAL-HACKING☆13Dec 20, 2023Updated 2 years ago
- ☆18Jan 2, 2018Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- Crawling and scraping the Web for fun and profit☆24Apr 13, 2023Updated 3 years ago
- Simple & efficient log file scanning and iptable filtering☆28Aug 13, 2022Updated 3 years ago
- Github repo from YouTube tutorial about customizing Airgeddon's Captive Portal template.☆14Aug 29, 2023Updated 2 years ago
- a raspberry pi zero w based hacking tool that installs a reverse shell on the target pc (running windows) which runs at startup using p4w…☆10Apr 12, 2021Updated 5 years ago