sensorfu / antsLinks
☆24Updated last year
Alternatives and similar repositories for ants
Users that are interested in ants are comparing it to the libraries listed below
Sorting:
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆384Updated last year
- The Noisy Sockets CLI☆264Updated last year
- A web fuzzer using the httpipe format☆101Updated last year
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆191Updated 8 months ago
- the NSA selector eurorack module☆165Updated 2 months ago
- Web Server Vulnerability Scanning Tool☆36Updated 9 months ago
- Sample code for finding AWS Account ID of an S3 bucket.☆50Updated last year
- Zaps arguments and environment from the process list☆238Updated last year
- A library for intercepting system calls☆103Updated 11 months ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆101Updated last month
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆123Updated 2 months ago
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆79Updated 11 months ago
- ☆24Updated last year
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆284Updated 3 weeks ago
- ☆101Updated 5 months ago
- Tail Certificate Transparency logs and extract hostnames☆126Updated 6 months ago
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆163Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated 3 months ago
- create local malicious git repo☆51Updated 9 months ago
- Extracts and decrypts passwords saved in Firefox.☆213Updated 5 months ago
- Notes and receipts (PCAPs) for TCP and ICMP Noise Storms☆50Updated last year
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Updated last month
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆104Updated last year
- Source code and examples for Antignis☆44Updated 3 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated 2 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆99Updated 4 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Updated last month
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆114Updated this week
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆91Updated 11 months ago