Watchtower, monitoring your Slack workspaces.
☆16Jan 26, 2021Updated 5 years ago
Alternatives and similar repositories for watchtower
Users that are interested in watchtower are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🤖 Daily updated translation maps for T-Pot☆22Apr 25, 2024Updated last year
- collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆16Aug 15, 2025Updated 7 months ago
- ☆34Updated this week
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Oct 24, 2022Updated 3 years ago
- Monitoring GitHub for sensitive data shared publicly☆65Dec 20, 2021Updated 4 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Human and machine readable web vulnerability testing format☆195Sep 19, 2022Updated 3 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- A wrapper library for the set of ptrace-related system calls in Linux☆13May 20, 2014Updated 11 years ago
- Putting the Sauce in CyberChef - making CyberChef automatable☆19Feb 18, 2026Updated last month
- Network Honeypot written in Rust☆15Mar 11, 2026Updated last week
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Run a list of functions in order in a given object context. The functions can be callback-taking or promise-returning.☆14Oct 25, 2025Updated 4 months ago
- ☆12Apr 5, 2025Updated 11 months ago
- convert VMWare and VirtualBox VM files to QEMU-KVM VM disk files☆10Jul 27, 2020Updated 5 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- A flexible cross-platform post-exploitation agent written in Go with basic functionalities☆17Mar 27, 2019Updated 6 years ago
- Experimental command suggestion system based on historical usage of commands in certain locations.☆12Feb 18, 2026Updated last month
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Mar 30, 2021Updated 4 years ago
- A Frida script to bypass SSL pinning in Instagram 157.0 and later (iOS)☆11Sep 20, 2020Updated 5 years ago
- Image/video processing proxy with static asset caching☆12Nov 7, 2023Updated 2 years ago
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- Don't let *them* read your mail. Encrypt it now.☆18Jun 13, 2018Updated 7 years ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- Semi-hand curated command-line option data for many CLI programs, geared toward bioinformatics tools. Shell completion scripts are also a…☆18Feb 24, 2026Updated last month
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last month
- Miscellaneous R functions and aliases☆10Jan 18, 2026Updated 2 months ago
- A webhook server that schedules commands on request. Uses Pueue as executor backend.☆18Mar 2, 2026Updated 3 weeks ago
- Finding exposed secrets and personal data in GitLab☆200Nov 18, 2024Updated last year
- A sleepy cron☆13Nov 8, 2017Updated 8 years ago
- A tool to find all duplicates in large sets of text documents.☆16Sep 29, 2021Updated 4 years ago
- Easily generate a list of offsets for use in SVM programs☆17Mar 6, 2026Updated 2 weeks ago
- ChatSecure for OS X☆12Mar 27, 2017Updated 8 years ago
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆46May 2, 2019Updated 6 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- Boyer-Moore-MagicLen, a fast string search algorithm implemented in Rust.☆13Dec 13, 2025Updated 3 months ago
- personal devel version of grid☆13Apr 29, 2020Updated 5 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago