sagarbhure / eBPFShieldLinks
☆64Updated 2 years ago
Alternatives and similar repositories for eBPFShield
Users that are interested in eBPFShield are comparing it to the libraries listed below
Sorting:
- Check IP addresses against known cloud provider IP address ranges☆45Updated 2 years ago
- masscan with exclusive excludes☆58Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆64Updated 9 months ago
- First iteration of ML based Feedback WAF☆59Updated last year
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆57Updated 3 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated 2 years ago
- Find what egress ports are allowed☆42Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆74Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆20Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 6 months ago
- ☆83Updated 2 months ago
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago
- ☆89Updated last year
- Signature based honeypot detector tool written in Golang☆103Updated 5 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 4 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 9 months ago
- NTP Exfiltration Tool☆145Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- JA4TScan is an active TCP server fingerprinting tool.☆88Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated 11 months ago
- ☆31Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated last month
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆29Updated 5 months ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated 2 years ago
- Check whether an IP address or hostname belongs to popular cloud providers☆69Updated this week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 8 months ago