☆140Aug 7, 2025Updated 6 months ago
Alternatives and similar repositories for facade
Users that are interested in facade are comparing it to the libraries listed below
Sorting:
- ☆18Feb 2, 2026Updated 3 weeks ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 11 months ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆123Dec 14, 2025Updated 2 months ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- ☆11May 13, 2024Updated last year
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆84Updated this week
- FluxN0de☆15Feb 22, 2022Updated 4 years ago
- Blog/Journal on how to backdoor VSCode extensions☆76Updated this week
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 7 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆20Sep 22, 2025Updated 5 months ago
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆202Dec 20, 2025Updated 2 months ago
- Turn any blog into structured threat intelligence.☆52Updated this week
- ☆30Jan 13, 2026Updated last month
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆40Sep 23, 2025Updated 5 months ago
- Gather all external facing AWS Services and run it through nmap☆13Feb 3, 2022Updated 4 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 4 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Register your Kubernetes IPs to monitor.shodan.io☆18Oct 28, 2022Updated 3 years ago
- DHCP fingerprints database and related tools☆19Nov 14, 2014Updated 11 years ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Updated this week
- ☆40Nov 29, 2024Updated last year
- Purple-team telemetry & simulation toolkit.☆106Dec 16, 2025Updated 2 months ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 6 months ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 2 months ago
- 《横向移动攻击与检测技术》专栏文章☆17Sep 5, 2019Updated 6 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago