☆145Aug 7, 2025Updated 7 months ago
Alternatives and similar repositories for facade
Users that are interested in facade are comparing it to the libraries listed below
Sorting:
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- ☆18Feb 2, 2026Updated last month
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- ☆25Mar 1, 2026Updated 2 weeks ago
- Security Blogs - A simple aggregator for security news/blog☆25Updated this week
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆85Mar 14, 2026Updated last week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Feb 23, 2026Updated 3 weeks ago
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆206Dec 20, 2025Updated 3 months ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆123Dec 14, 2025Updated 3 months ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated 2 months ago
- ☆11May 13, 2024Updated last year
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- A Benchmark Tool for Natural Language-based Network Management☆29Jun 18, 2024Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- ☆30Jan 13, 2026Updated 2 months ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 8 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- 🛡️ High-performance WAF & CDN detection tool. Identify protection layers (Cloudflare, Akamai, AWS, Fastly, and more), run effectiveness …☆110Mar 9, 2026Updated last week
- ☆42Nov 13, 2025Updated 4 months ago
- Turn any blog into structured threat intelligence.☆54Updated this week
- Blog/Journal on how to backdoor VSCode extensions☆78Feb 24, 2026Updated 3 weeks ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- FluxN0de☆15Feb 22, 2022Updated 4 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- x86 Microkernel☆16Apr 1, 2020Updated 5 years ago
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆45Sep 23, 2025Updated 5 months ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 6 months ago
- Live reloading for Go servers☆10Jan 7, 2024Updated 2 years ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Feb 25, 2026Updated 3 weeks ago