ex0dus-0x / confineLinks
Small container runtime for threat detection
☆14Updated 7 months ago
Alternatives and similar repositories for confine
Users that are interested in confine are comparing it to the libraries listed below
Sorting:
- 🕵️♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️☆35Updated 2 years ago
- Bruteforce with a stream of permutations of a specific pattern☆27Updated 3 months ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆15Updated last week
- Test Suite for John the Ripper☆25Updated 3 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- An attack/exploit Detector that utilizes Polymorphism and Diversity☆30Updated 3 years ago
- Automated attack surface mapper and vulnerability scanner (Work In Progress 🚧)☆88Updated 4 years ago
- ☆18Updated 2 years ago
- Linkable sandbox explorer☆84Updated 9 months ago
- A DNS library for Rust.☆23Updated 7 months ago
- A coroutines-driven Low & Slow traffic sender, written in Rust☆32Updated 6 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Search for secrets left in git history☆13Updated 7 years ago
- A simple and secure DNS client crate for Rust.☆37Updated 6 months ago
- Fork of proxychains with support of multiple chains. Chains are selected according to filters assigned to them.☆18Updated 11 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 5 years ago
- Golang tool to scan hosts for SMB version and signing status☆16Updated last year
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆230Updated 3 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 4 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 5 years ago
- Provides access to libhashcat☆31Updated last year
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- Detect Phishing fetching Certificate Transparency Logs☆22Updated 4 years ago
- Common User Passwords Profiler (CUPP) in Rust☆27Updated last year
- tamper resistant audit log☆18Updated 7 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆23Updated 4 years ago
- ssshh its a secret ;)☆22Updated 3 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
- Analyse binaries for missing security features, information disclosure and more...☆87Updated 2 years ago