thinkst / canaryfyLinks
Linux file read monitor
☆90Updated 2 years ago
Alternatives and similar repositories for canaryfy
Users that are interested in canaryfy are comparing it to the libraries listed below
Sorting:
- Repo for autosnort scripts.☆157Updated 5 years ago
- ☆147Updated 9 years ago
- Transparent network tap☆120Updated 10 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- ☆208Updated 7 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 9 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- a grep -r for secrets☆178Updated 3 years ago
- ☆142Updated last year
- ☆104Updated 6 years ago
- ☆78Updated 10 years ago
- Web Sight Docker Deployment☆122Updated 8 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆384Updated 5 years ago
- Duct Tape Command and Control!☆96Updated 4 months ago
- Scan SSH ciphers☆160Updated last year
- Continuous Integration and Development ExploiteR☆87Updated 3 years ago
- A UNIX security auditing tool based on several security frameworks☆320Updated 2 months ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- DEF CON Hacker Tracker☆108Updated 3 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Fast http dead file finder.☆217Updated 5 months ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆92Updated 6 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆188Updated 5 years ago