sensorfu / antsLinks
☆24Updated last year
Alternatives and similar repositories for ants
Users that are interested in ants are comparing it to the libraries listed below
Sorting:
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆384Updated last year
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆192Updated 9 months ago
- A web fuzzer using the httpipe format☆98Updated last year
- Web Server Vulnerability Scanning Tool☆36Updated 10 months ago
- The Noisy Sockets CLI☆264Updated last year
- Sample code for finding AWS Account ID of an S3 bucket.☆49Updated last year
- Notes and receipts (PCAPs) for TCP and ICMP Noise Storms☆49Updated last year
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆283Updated 2 months ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆124Updated 3 months ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆107Updated 3 months ago
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆195Updated last month
- Source code and examples for Antignis☆44Updated 3 years ago
- Tail Certificate Transparency logs and extract hostnames☆127Updated 7 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134Updated 9 months ago
- the NSA selector eurorack module☆165Updated 3 months ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆601Updated 3 months ago
- ☆83Updated 2 months ago
- A library for intercepting system calls☆103Updated last year
- ☆74Updated 4 months ago
- A guide + python notebook that helps to collect, analyse and visualise requests sent by a mobile device while using some app.☆140Updated 9 months ago
- Extracts and decrypts passwords saved in Firefox.☆214Updated 7 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆41Updated 2 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated 5 months ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆104Updated 2 years ago
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆247Updated this week
- Blessed sanctum, save us || Sanctum is a small, reviewable, capable, pq-secure and fully privilege seperated VPN daemon. || This is a rea…☆92Updated last week
- 🛡️ High-performance WAF & CDN detection tool with effectiveness testing suite. Identify protection layers (Cloudflare, Akamai, AWS) and …☆106Updated this week
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Updated last month
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆127Updated last month