Find interesting and potentially hazardous commits in git projects
☆354Sep 6, 2018Updated 7 years ago
Alternatives and similar repositories for commit-watcher
Users that are interested in commit-watcher are comparing it to the libraries listed below
Sorting:
- Community rules for Commit Watcher☆24Jun 9, 2016Updated 9 years ago
- Alienvault Labs Projects Random Stuff☆529Dec 22, 2021Updated 4 years ago
- Web framework that allows performing periodic syncs of data sources and performing analysis on the identified results☆2,647Jan 10, 2020Updated 6 years ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,736May 28, 2024Updated last year
- A forensic evidence collection & analysis toolkit for OS X☆1,893Jun 19, 2019Updated 6 years ago
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,170Nov 2, 2021Updated 4 years ago
- Distributed & real time digital forensics at the speed of the cloud☆1,204Sep 13, 2019Updated 6 years ago
- Mac Intrusion Detection Analysis System☆826Sep 23, 2015Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Golang Proc Sockets Library☆19Sep 9, 2017Updated 8 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Aug 10, 2018Updated 7 years ago
- GRR Rapid Response: remote live forensics for incident response☆5,040Feb 16, 2026Updated last week
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆5,019Feb 9, 2026Updated 2 weeks ago
- Modern Honey Network☆2,469Nov 30, 2024Updated last year
- A simple UI for Docker Registry in go☆10Jul 1, 2016Updated 9 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- OS X Auditor is a free Mac OS X computer forensics tool☆3,133Jul 27, 2020Updated 5 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- an osquery fleet manager☆620Dec 8, 2022Updated 3 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,922May 3, 2022Updated 3 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆142Jul 9, 2024Updated last year
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Nov 4, 2022Updated 3 years ago
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,306Updated this week
- Providence is a system for code commit & bug system monitoring. It is deployed within an organization to monitor code commits for securit…☆71Feb 12, 2022Updated 4 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆61May 8, 2017Updated 8 years ago
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,993Feb 18, 2026Updated last week
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- The core logic powering Bump☆12Mar 5, 2018Updated 7 years ago
- Reconnaissance tool for GitHub organizations☆6,140Sep 20, 2022Updated 3 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- A tool to surface security issues in python code☆227Apr 20, 2017Updated 8 years ago
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago