sagarbhure / eBPFShieldLinks
☆63Updated 2 years ago
Alternatives and similar repositories for eBPFShield
Users that are interested in eBPFShield are comparing it to the libraries listed below
Sorting:
- Check IP addresses against known cloud provider IP address ranges☆47Updated this week
- masscan with exclusive excludes☆58Updated 2 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆66Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Updated 2 years ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 10 months ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆60Updated last month
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Updated 3 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Check whether an IP address or hostname belongs to popular cloud providers☆86Updated this week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- First iteration of ML based Feedback WAF☆59Updated last year
- ☆76Updated 7 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 9 months ago
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- ☆86Updated last week
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 6 months ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆108Updated 10 months ago
- Create honeypots for cloud environments☆110Updated 4 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- ☆91Updated 2 months ago
- Find what egress ports are allowed☆46Updated 2 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated 2 years ago
- ☆56Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year