google / facadeLinks
☆136Updated 5 months ago
Alternatives and similar repositories for facade
Users that are interested in facade are comparing it to the libraries listed below
Sorting:
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Updated 6 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- Examine Chrome extensions for security issues☆92Updated 2 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆88Updated last month
- Dont Gamble with Risk☆14Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- ☆52Updated last month
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Updated last month
- ☆40Updated 2 months ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 4 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Updated 5 months ago
- ☆83Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Living off the False Positive!☆41Updated 11 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- ☆18Updated last week
- Create honeypots for cloud environments☆109Updated 3 months ago
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆29Updated 3 weeks ago
- ☆14Updated last week
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- ☆74Updated 3 months ago
- ☆41Updated last year
- ☆15Updated 3 years ago
- ☆18Updated this week
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated last month