Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
☆89Jan 21, 2026Updated 2 months ago
Alternatives and similar repositories for sandfly-setup
Users that are interested in sandfly-setup are comparing it to the libraries listed below
Sorting:
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆168Jun 11, 2024Updated last year
- Easily Expandable Wireless Intrusion Detection System☆30Oct 12, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- Collecting, processing and presenting information about WiFi access points and their geolocation. A versatile wardriving command center.☆15Mar 14, 2026Updated last week
- IR drill plateform☆23Jul 29, 2025Updated 7 months ago
- OpenArk is a open source anti-rookit(Ark) tool on Windows.☆18Jul 18, 2019Updated 6 years ago
- ☆21Oct 3, 2019Updated 6 years ago
- 无线局域网入侵检测系统☆12Oct 25, 2018Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)☆303Oct 6, 2023Updated 2 years ago
- Hunt the windows Registry automatically using VQL☆14Jan 6, 2026Updated 2 months ago
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated 2 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Create malware knowledge graphs from analysis reports☆39Dec 6, 2023Updated 2 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- 🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.☆23Updated this week
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Terraform module providing a secure baseline for AWS☆18Jun 17, 2025Updated 9 months ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago