sensorfu / antsLinks
☆24Updated 10 months ago
Alternatives and similar repositories for ants
Users that are interested in ants are comparing it to the libraries listed below
Sorting:
- The Noisy Sockets CLI☆263Updated last year
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆190Updated 6 months ago
- A web fuzzer using the httpipe format☆101Updated last year
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆383Updated last year
- Blessed sanctum, save us || Sanctum is a small, reviewable, capable, pq-secure and fully privilege seperated VPN daemon. || This is a rea…☆80Updated this week
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆120Updated last week
- Web Server Vulnerability Scanning Tool☆36Updated 7 months ago
- eBPF Port Knocking Tool☆236Updated 2 years ago
- Zaps arguments and environment from the process list☆234Updated last year
- create local malicious git repo☆51Updated 7 months ago
- A library for intercepting system calls☆103Updated 9 months ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆589Updated 3 weeks ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆90Updated 2 weeks ago
- Extracts and decrypts passwords saved in Firefox.☆208Updated 3 months ago
- the NSA selector eurorack module☆165Updated last week
- Sample code for finding AWS Account ID of an S3 bucket.☆50Updated last year
- ☆23Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆79Updated 9 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆251Updated this week
- Source code and examples for Antignis☆43Updated 3 years ago
- Notes and receipts (PCAPs) for TCP and ICMP Noise Storms☆50Updated last year
- An MCP extension for Ghidra☆326Updated last week
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆241Updated 2 months ago
- Visualize binary files☆133Updated last month
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Updated 2 months ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆53Updated 2 months ago
- Determine Who Can Log In to an SSH Server☆29Updated 4 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆186Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆25Updated last month