Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
☆88Jan 21, 2026Updated last month
Alternatives and similar repositories for sandfly-setup
Users that are interested in sandfly-setup are comparing it to the libraries listed below
Sorting:
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Jun 11, 2024Updated last year
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- OpenArk is a open source anti-rookit(Ark) tool on Windows.☆18Jul 18, 2019Updated 6 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last week
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- ☆21Oct 3, 2019Updated 6 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- Remote shell victim machines☆23Sep 13, 2019Updated 6 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated this week
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated last year
- List of linux kernel versions and download links in JSON☆10Jun 29, 2024Updated last year
- Collecting, processing and presenting information about WiFi access points and their geolocation. A versatile wardriving command center.☆15Feb 7, 2026Updated 3 weeks ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 4 months ago
- ☆13Oct 14, 2017Updated 8 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- 无线局域网入侵检测系统☆12Oct 25, 2018Updated 7 years ago
- ☆49Sep 20, 2019Updated 6 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)☆303Oct 6, 2023Updated 2 years ago