Small container runtime for threat detection
☆14Apr 13, 2025Updated 11 months ago
Alternatives and similar repositories for confine
Users that are interested in confine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- Minimal network simulator using Docker and netem. Licensed under EUPLv1.1☆16Aug 22, 2017Updated 8 years ago
- Minimal and persistent key-value store designed with security in mind☆43Jan 16, 2023Updated 3 years ago
- Inexpensive, reliable, dynamic DNS over IRC☆16Jun 29, 2021Updated 4 years ago
- low-level bindings to libseccomp☆12Mar 6, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆12Jun 12, 2024Updated last year
- CryptGuard is a comprehensive cryptographic library, offering robust encryption and decryption capabilities. It integrates traditional cr…☆21Sep 23, 2025Updated 6 months ago
- Raccolta di flags e writeup delle challenge presenti su https://training.olicyber.it/challenges☆18Feb 26, 2023Updated 3 years ago
- Run ebpf programs in docker (e.g., bpftrace)☆27Oct 6, 2022Updated 3 years ago
- Connect to Cabal using an IRC client.☆18Dec 7, 2019Updated 6 years ago
- force-bind with seccomp-bpf notifications☆17Dec 14, 2023Updated 2 years ago
- FreeBSD to hardenedBSD up to date conversion☆14Dec 24, 2019Updated 6 years ago
- Simple seccomp library for rust☆22Sep 28, 2023Updated 2 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11Feb 9, 2023Updated 3 years ago
- A PoC packer written in Rust!☆74Apr 1, 2022Updated 3 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Binary (In)security tool☆25May 27, 2024Updated last year
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- ☆11Dec 26, 2022Updated 3 years ago
- Kubernetes Operator for Redis cluster based on Undermoon☆28Feb 11, 2023Updated 3 years ago
- ☆18Jan 2, 2018Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- Crawling and scraping the Web for fun and profit☆24Apr 13, 2023Updated 2 years ago
- Simple & efficient log file scanning and iptable filtering☆28Aug 13, 2022Updated 3 years ago
- Github repo from YouTube tutorial about customizing Airgeddon's Captive Portal template.☆14Aug 29, 2023Updated 2 years ago
- a raspberry pi zero w based hacking tool that installs a reverse shell on the target pc (running windows) which runs at startup using p4w…☆10Apr 12, 2021Updated 4 years ago