☆155Mar 31, 2026Updated last month
Alternatives and similar repositories for facade
Users that are interested in facade are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An OpenAI API Compatible Honeypot Gateway☆22Mar 17, 2025Updated last year
- ☆18Feb 2, 2026Updated 3 months ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- Security Blogs - A simple aggregator for security news/blog☆28Updated this week
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆135Jul 22, 2025Updated 9 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 6 months ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 5 months ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆13Jan 11, 2026Updated 4 months ago
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆244Apr 28, 2026Updated 3 weeks ago
- ☆12May 13, 2024Updated 2 years ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆23Apr 13, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆44May 8, 2026Updated last week
- ☆30Jan 13, 2026Updated 4 months ago
- Threat hunting with Sysmon and ArangoDB Graphs☆13Apr 16, 2020Updated 6 years ago
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆122May 8, 2026Updated last week
- System Call Integrity Layer - experimental security research☆27Apr 14, 2026Updated last month
- Turn any blog into structured threat intelligence.☆58Updated this week
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- ☆42Nov 13, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆13Nov 10, 2020Updated 5 years ago
- FluxN0de☆15Feb 22, 2022Updated 4 years ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated 2 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆89Jan 11, 2024Updated 2 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 11 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆134Apr 23, 2026Updated 3 weeks ago
- Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" ma…☆538Apr 30, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆382Oct 1, 2024Updated last year
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆104Feb 25, 2026Updated 2 months ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 8 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- Set of PoC to abuse Windows minifilters functionality☆83May 1, 2026Updated 2 weeks ago