sagarbhure / eBPFShieldLinks
☆63Updated 2 years ago
Alternatives and similar repositories for eBPFShield
Users that are interested in eBPFShield are comparing it to the libraries listed below
Sorting:
- Check IP addresses against known cloud provider IP address ranges☆46Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Updated 2 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 9 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆31Updated 2 months ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago
- masscan with exclusive excludes☆58Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- ☆56Updated 11 months ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 5 months ago
- ☆86Updated last week
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆60Updated 2 weeks ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- Find what egress ports are allowed☆45Updated 2 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆13Updated 6 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆40Updated 2 years ago
- ☆31Updated 3 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago