sensorfu / antsLinks
☆24Updated 8 months ago
Alternatives and similar repositories for ants
Users that are interested in ants are comparing it to the libraries listed below
Sorting:
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆383Updated 11 months ago
- the NSA selector eurorack module☆163Updated 3 weeks ago
- Sample code for finding AWS Account ID of an S3 bucket.☆49Updated last year
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆108Updated 7 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆253Updated last week
- The Noisy Sockets CLI☆264Updated 11 months ago
- A web fuzzer using the httpipe format☆101Updated last year
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆189Updated 4 months ago
- Web Server Vulnerability Scanning Tool☆36Updated 5 months ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆585Updated last month
- Notes and receipts (PCAPs) for TCP and ICMP Noise Storms☆50Updated 11 months ago
- Extracts and decrypts passwords saved in Firefox.☆210Updated last month
- create local malicious git repo☆51Updated 5 months ago
- Zaps arguments and environment from the process list☆211Updated last year
- A standard for reducing log volume without sacrificing analytical capability☆209Updated 6 months ago
- OS image for the PiRogue based on Debian 12☆158Updated last year
- ☆23Updated 11 months ago
- Blessed sanctum, save us || Sanctum is a small, reviewable, capable, pq-secure and fully privilege seperated VPN daemon. || This is a rea…☆76Updated this week
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆85Updated last month
- ☆95Updated last month
- Pākiki is an intercepting proxy designed to help penetration testers find security vulnerabilities in web or mobile applications. This re…☆45Updated 4 months ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆52Updated last week
- Source code and examples for Antignis☆43Updated 2 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Transfer a raw TCP or Unix stream or files through a unidirectional link with forward error correction☆85Updated 5 months ago
- An MCP extension for Ghidra☆303Updated 3 weeks ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆268Updated this week
- Determine Who Can Log In to an SSH Server☆29Updated 2 months ago
- A domain name permutation and enumeration library powered by Rust.☆128Updated this week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 7 months ago