thinkst / canaryfyLinks
Linux file read monitor
☆90Updated last year
Alternatives and similar repositories for canaryfy
Users that are interested in canaryfy are comparing it to the libraries listed below
Sorting:
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- Exfiltrate files via DNS☆95Updated 11 years ago
- ☆144Updated 8 years ago
- Repo for autosnort scripts.☆158Updated 4 years ago
- ☆208Updated 7 years ago
- a grep -r for secrets☆178Updated 3 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- ☆78Updated 10 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- A place to collect the different document templates for ROS☆62Updated 6 years ago
- Internet data acquisition☆149Updated 4 years ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- Collection of Auditd Examples and Presentations☆84Updated 4 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 6 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 3 months ago
- Vulnerability Data in ES☆145Updated 7 years ago
- ☆141Updated last year
- ☆47Updated 10 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- A python wrapper around https://cve.circl.lu.☆55Updated last month
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- Common Findings Database☆101Updated 6 years ago
- Various Cheat Sheets related to development and security☆143Updated 5 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago