thinkst / canaryfy
Linux file read monitor
☆89Updated last year
Alternatives and similar repositories for canaryfy:
Users that are interested in canaryfy are comparing it to the libraries listed below
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Repo for autosnort scripts.☆156Updated 4 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- Transparent network tap☆116Updated 9 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- a grep -r for secrets☆178Updated 2 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- ☆141Updated 8 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆129Updated 7 years ago
- ☆104Updated 5 years ago
- Rogue AP killer☆89Updated 7 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Nmap Script to scan for Winnti infections☆70Updated 6 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆46Updated 7 years ago
- A Github organization reconnaissance tool.☆216Updated last year
- Common Findings Database☆100Updated 5 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Evolving directions on building the best Open Source Forensics VM☆157Updated 6 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- ☆140Updated 10 months ago
- Web Sight Docker Deployment☆124Updated 7 years ago