ex0dus-0x / confine
Small container runtime for threat detection
☆12Updated 3 years ago
Alternatives and similar repositories for confine:
Users that are interested in confine are comparing it to the libraries listed below
- tamper resistant audit log☆18Updated 6 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- A tool to attack ARP☆13Updated 3 years ago
- 🕵️♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️☆32Updated 2 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Updated this week
- Python framework for manipulating bulk WHOIS data from RIRs☆20Updated 2 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- EXPERIMENTAL Secure hidden service webserver☆51Updated 2 years ago
- ssshh its a secret ;)☆22Updated 2 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Updated 11 months ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Warning! Don't run this code on your computer.☆15Updated 5 years ago
- A simple trap for web crawlers☆12Updated last year
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- How Enable Security handles security vulnerabilities☆11Updated 4 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- An SSH honeypot written entirely in Go.☆13Updated last month
- vyos based isolation of networks☆11Updated 4 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 4 years ago
- Common User Passwords Profiler (CUPP) in Rust☆25Updated 6 months ago
- ☆18Updated last year
- ☆17Updated last year
- A list of backdoor samples I find online.☆13Updated 5 years ago
- An attack/exploit Detector that utilizes Polymorphism and Diversity☆28Updated 2 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago