Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
☆91Apr 7, 2026Updated last month
Alternatives and similar repositories for sandfly-setup
Users that are interested in sandfly-setup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jan 2, 2020Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- Collecting, processing and presenting information about WiFi access points and their geolocation. A versatile wardriving command center.☆15Mar 16, 2026Updated 2 months ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆67Nov 13, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- IR drill plateform☆23Jul 29, 2025Updated 9 months ago
- ☆21Oct 3, 2019Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 7 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- AES Ransomware in batch☆12Jun 25, 2024Updated last year
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- USENIX 2023 Artifacts☆12Nov 25, 2022Updated 3 years ago
- An example of how to build a realtime app with Node.js☆11Apr 10, 2017Updated 9 years ago
- Remote shell victim machines☆23Sep 13, 2019Updated 6 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- Application scanning component of OWASP PurpleTeam☆15Feb 12, 2023Updated 3 years ago
- ☆49Sep 20, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- WPA cracking tool for Android☆10Jul 17, 2020Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 5 years ago
- Lists of products useful for ICS security☆108Jun 24, 2024Updated last year
- Living off the False Positive!☆42Apr 3, 2026Updated last month
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Terraform module providing a secure baseline for AWS☆18Jun 17, 2025Updated 11 months ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- Steve McCanne's Sharkfest '21 Talk☆16Oct 12, 2021Updated 4 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Tools and Techniques for Blue Team / Incident Response☆23Mar 8, 2023Updated 3 years ago