ex0dus-0x / confineLinks
Small container runtime for threat detection
β14Updated 3 months ago
Alternatives and similar repositories for confine
Users that are interested in confine are comparing it to the libraries listed below
Sorting:
- π΅οΈββοΈ Find, locate, and query files for ops and security experts β‘οΈβ‘οΈβ‘οΈβ33Updated 2 years ago
- An attack/exploit Detector that utilizes Polymorphism and Diversityβ29Updated 3 years ago
- Linkable sandbox explorerβ83Updated 6 months ago
- Bruteforce with a stream of permutations of a specific patternβ27Updated 11 months ago
- Automated attack surface mapper and vulnerability scanner (Work In Progress π§)β88Updated 3 years ago
- A simple and secure DNS client crate for Rust.β37Updated 3 months ago
- Search for secrets left in git historyβ13Updated 6 years ago
- Fork of proxychains with support of multiple chains. Chains are selected according to filters assigned to them.β18Updated 11 years ago
- Test Suite for John the Ripperβ25Updated 3 years ago
- Common User Passwords Profiler (CUPP) in Rustβ27Updated last year
- Universal LAN-based SSRF Attack Primitiveβ19Updated 6 years ago
- Simplified NAT Slipstream server and clientβ22Updated 4 years ago
- DES Encrypter/Decrypterβ18Updated 8 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.β18Updated 4 years ago
- ssshh its a secret ;)β22Updated 3 years ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenariosβ14Updated 2 weeks ago
- WhiteBeam: Transparent endpoint securityβ101Updated 2 years ago
- Detect Phishing fetching Certificate Transparency Logsβ20Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)β13Updated 3 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergencyβ12Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejsβ14Updated 4 years ago
- The program was rewritten: https://github.com/nitrogenez/bullyβ24Updated 2 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what soβ¦β23Updated 4 years ago
- A first look at browser-based Cryptojackingβ17Updated 7 years ago
- A coroutines-driven Low & Slow traffic sender, written in Rustβ32Updated 6 years ago
- β17Updated last year
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install alβ¦β14Updated 5 years ago
- Golang tool to scan hosts for SMB version and signing statusβ16Updated 8 months ago
- Remove Offensive and Profane Words from Wordlistsβ15Updated 2 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a supportβ¦β16Updated 2 years ago