Stealth is a File Integrity scanner performing its work in a stealthy way.
☆12Jun 25, 2018Updated 7 years ago
Alternatives and similar repositories for stealth
Users that are interested in stealth are comparing it to the libraries listed below
Sorting:
- Malware analysis using Docker project☆25Mar 3, 2016Updated 9 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- ☆40Mar 18, 2020Updated 5 years ago
- port.c and portmacro.h for FreeRTOS to run on any AVR XMEGA☆15Sep 3, 2012Updated 13 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Zeek support for Community ID flow hashing.☆37Jul 11, 2023Updated 2 years ago
- ☆10May 28, 2025Updated 8 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- A readline replacement. This is an evolution of the tinyrl library from clish.☆11Jan 29, 2016Updated 10 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- A repository of example scripts, templates and modules for deploying SentinelOne agents☆24Dec 12, 2025Updated 2 months ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Node.js wrapper for retrieving information from the PulsePoint API☆12Jun 21, 2024Updated last year
- describing the FISMA Ready project and its goals☆12Mar 20, 2019Updated 6 years ago
- metalog is a syslog replacement that allows regular expresion matching☆42Feb 21, 2026Updated last week
- Bro Detection Scripts☆10Mar 9, 2021Updated 4 years ago
- A simple yet useful oscilloscope for arduino duemilanove☆28Aug 28, 2010Updated 15 years ago
- Docker data container☆11Aug 23, 2015Updated 10 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- ☆12Oct 8, 2025Updated 4 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Docker image for ReadyMedia (formerly known as MiniDLNA), a DLNA/UPnP-AV Media server with transcode support.☆12Mar 10, 2016Updated 9 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Collection of configs, and lab topology files.☆19Feb 4, 2020Updated 6 years ago
- distributed lock using zookeeper☆11Jan 11, 2023Updated 3 years ago
- Parser of ssh public and private keys☆12Apr 7, 2020Updated 5 years ago
- Ikev2 VPN + Strongswan + FreeRadius Authentication☆10Jan 7, 2020Updated 6 years ago
- Passive discovery and listing of devices on a network☆12Apr 21, 2025Updated 10 months ago
- The simplest database for Node.js that could possible work.☆12Apr 3, 2013Updated 12 years ago
- Repository for third party codes.☆14Aug 19, 2019Updated 6 years ago
- ⨝ Mandatory Access Control for SQLite databases☆14Oct 11, 2016Updated 9 years ago
- Pop-up LastPass desktop quick-search. Output the selection to the clipboard or have xdotool type it out for you.☆10Aug 8, 2024Updated last year
- A GUI which enables drawing using Python scripts☆10Mar 27, 2024Updated last year
- A data analysis GUI for R☆11May 5, 2025Updated 9 months ago