Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
☆90Apr 7, 2026Updated this week
Alternatives and similar repositories for sandfly-setup
Users that are interested in sandfly-setup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆170Jun 11, 2024Updated last year
- Easily Expandable Wireless Intrusion Detection System☆30Oct 12, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- Collecting, processing and presenting information about WiFi access points and their geolocation. A versatile wardriving command center.☆15Mar 16, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- OpenArk is a open source anti-rookit(Ark) tool on Windows.☆18Jul 18, 2019Updated 6 years ago
- IR drill plateform☆23Jul 29, 2025Updated 8 months ago
- ☆21Oct 3, 2019Updated 6 years ago
- 无线局域网入侵检测系统☆12Oct 25, 2018Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 6 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Create malware knowledge graphs from analysis reports☆40Dec 6, 2023Updated 2 years ago
- Remote shell victim machines☆23Sep 13, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆49Sep 20, 2019Updated 6 years ago
- 🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.☆23Mar 23, 2026Updated 2 weeks ago
- WPA cracking tool for Android☆10Jul 17, 2020Updated 5 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- Lists of products useful for ICS security☆108Jun 24, 2024Updated last year
- Living off the False Positive!☆42Apr 3, 2026Updated last week
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Terraform module providing a secure baseline for AWS☆18Jun 17, 2025Updated 9 months ago