sgInnora / sharpeyeView external linksLinks
SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System
☆175Jan 21, 2026Updated 3 weeks ago
Alternatives and similar repositories for sharpeye
Users that are interested in sharpeye are comparing it to the libraries listed below
Sorting:
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 3 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- An index of publicly available and open-source threat detection rulesets.☆131Apr 17, 2025Updated 9 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 10 months ago
- ☆23Mar 4, 2025Updated 11 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆41Feb 8, 2026Updated last week
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 3 weeks ago
- llvm powered deobfuscation of a vm-based protection☆46Apr 18, 2025Updated 9 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆28Nov 26, 2025Updated 2 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆75Sep 1, 2025Updated 5 months ago
- ☆43Jul 17, 2025Updated 7 months ago
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆79Feb 5, 2026Updated last week
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 6 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆313Feb 8, 2026Updated last week
- ☆18Feb 2, 2026Updated 2 weeks ago
- This is a guide to removing PDF watermarks. It contains the lessons learned from an experiment of mine.☆18Oct 11, 2024Updated last year
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 11 months ago
- This project provides a distributed system for synthetic network monitoring and BGP analysis, inspired by platforms like ThousandEyes.☆55May 27, 2025Updated 8 months ago
- Make your programs stealthier🐝☆201Jun 12, 2025Updated 8 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- Honeypot Service Simulator☆22Sep 9, 2024Updated last year
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆256Jun 10, 2025Updated 8 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆70Nov 27, 2025Updated 2 months ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Jul 13, 2025Updated 7 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆512Feb 6, 2026Updated last week
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆338Updated this week
- A library for intercepting system calls☆103Jan 5, 2025Updated last year
- Windows anti-debugging sandbox☆40Dec 24, 2025Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Mar 26, 2025Updated 10 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109May 30, 2025Updated 8 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆104Feb 6, 2025Updated last year