ex0dus-0x / confineLinks
Small container runtime for threat detection
β14Updated 9 months ago
Alternatives and similar repositories for confine
Users that are interested in confine are comparing it to the libraries listed below
Sorting:
- Bruteforce with a stream of permutations of a specific patternβ26Updated 5 months ago
- Automated attack surface mapper and vulnerability scanner (Work In Progress π§)β86Updated 4 years ago
- π΅οΈββοΈ Find, locate, and query files for ops and security experts β‘οΈβ‘οΈβ‘οΈβ36Updated 3 years ago
- Test Suite for John the Ripperβ25Updated last month
- Linkable sandbox explorerβ83Updated last year
- The program was rewritten: https://github.com/nitrogenez/bullyβ25Updated 2 years ago
- WhiteBeam: Transparent endpoint securityβ101Updated 2 years ago
- An attack/exploit Detector that utilizes Polymorphism and Diversityβ30Updated 3 years ago
- transparent TCP-to-proxy redirectorβ16Updated 6 years ago
- A simple trap for web crawlersβ12Updated 2 years ago
- A DNS library for Rust.β23Updated 10 months ago
- ssshh its a secret ;)β21Updated 3 years ago
- Search for secrets left in git historyβ14Updated 7 years ago
- A coroutines-driven Low & Slow traffic sender, written in Rustβ33Updated 6 years ago
- A simple and secure DNS client crate for Rust.β37Updated 8 months ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.β18Updated 4 years ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenariosβ16Updated last month
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a supportβ¦β17Updated 3 years ago
- Universal LAN-based SSRF Attack Primitiveβ19Updated 6 years ago
- Remove Offensive and Profane Words from Wordlistsβ15Updated 2 years ago
- β18Updated 2 years ago
- tamper resistant audit logβ17Updated 7 years ago
- Network scan tool for host and service discovery. Written in Rust.β20Updated 3 months ago
- Provides access to libhashcatβ31Updated last year
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what soβ¦β25Updated 4 years ago
- The WASM Based Security Toolkit for the Web First Paradigmβ36Updated 2 years ago
- Common User Passwords Profiler (CUPP) in Rustβ26Updated last year
- Single-threaded epoll-based concurrent bulk whois clientβ31Updated 8 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.β48Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.β10Updated 4 years ago