shindan-io / scnr
deep file scanner tool
☆37Updated last week
Alternatives and similar repositories for scnr:
Users that are interested in scnr are comparing it to the libraries listed below
- DEbian Cve REproducer Tool☆22Updated last year
- Tool for obfuscating and deobfuscating data.☆69Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 5 months ago
- ☆38Updated 4 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 7 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 6 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated 2 weeks ago
- eBPF Memory Dump Tool☆62Updated 3 weeks ago
- ☆69Updated 2 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆38Updated last year
- A meta-database collecting resources that compile lists of breaches☆18Updated 4 months ago
- VSCode Extension for Deciduous☆9Updated 3 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated last year
- Automated vulnerability discovery and annotation☆65Updated 8 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 6 months ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- ☆15Updated 8 months ago
- Security tool against dependency typosquatting attacks☆39Updated last week
- ☆29Updated 4 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated last month
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆11Updated last month
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆43Updated 3 weeks ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆56Updated 2 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆42Updated last month
- ☆33Updated 7 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Updated 7 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆45Updated 3 weeks ago