matheus-1618 / Atreus
Anti-Ransomware to mitigate and neutralize Ryuk Threat.
☆18Updated 10 months ago
Alternatives and similar repositories for Atreus:
Users that are interested in Atreus are comparing it to the libraries listed below
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆49Updated last month
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 3 months ago
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆72Updated this week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Canary Detection☆167Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆68Updated this week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated last year
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working s…☆28Updated 9 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 4 months ago
- 📡 802.11 broadcast analyzer & injector☆135Updated 3 weeks ago
- Bluetooth Landscape Exploration & Enumeration Platform☆47Updated 2 months ago
- Efficient DevSecOps☆47Updated 4 months ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆168Updated 9 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 6 months ago
- God Mode Detection Rules☆134Updated 8 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆80Updated 8 months ago
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆86Updated 6 months ago
- Identify hardcoded secrets in static structured text (version 2)☆91Updated 2 months ago
- A modular exploitation framework extensible with Lua☆64Updated last month
- Stalker, the Extensible Attack Surface Management tool.☆83Updated this week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆165Updated 2 weeks ago
- Modular web-application honeypot platform built using go and gin☆57Updated 11 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆14Updated 5 months ago
- Secure Code Review AI Agent (SeCoRA) - AI SAST☆47Updated 2 months ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- A Pentest Collaboration and Reporting Tool☆59Updated last month
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆68Updated 9 months ago
- a hackbot proof-of-concept☆39Updated last year
- Protection against HTML smuggling attacks.☆95Updated this week
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year