fbb-git / stealthLinks
Stealth is a File Integrity scanner performing its work in a stealthy way.
☆12Updated 7 years ago
Alternatives and similar repositories for stealth
Users that are interested in stealth are comparing it to the libraries listed below
Sorting:
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 10 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 10 months ago
- Probing a network for Ubiquiti devices and parsing responses☆19Updated 8 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- A low/zero interaction ssh authentication logging honeypot☆23Updated last year
- Central correlator for opencanary instances☆17Updated 3 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- AYY LMAO☆22Updated 9 years ago
- Collection of Auditd Examples and Presentations☆85Updated 4 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- BRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to captu…☆19Updated 5 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆26Updated last year
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- Automated daily scan using Nmap and report on the differences☆92Updated 7 years ago
- Broctl plugin for automatically executing 'setcap' on each node after an install☆13Updated 4 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago