thinkst / canaryfyLinks
Linux file read monitor
☆91Updated 2 years ago
Alternatives and similar repositories for canaryfy
Users that are interested in canaryfy are comparing it to the libraries listed below
Sorting:
- Repo for autosnort scripts.☆157Updated 5 years ago
- Transparent network tap☆119Updated 10 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- a grep -r for secrets☆178Updated 3 years ago
- ☆146Updated 9 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- ☆78Updated 10 years ago
- Automatic firewall rule orchestator.☆83Updated 8 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- ☆208Updated 7 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆161Updated 5 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- Various Cheat Sheets related to development and security☆143Updated 5 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Updated 7 months ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆92Updated 6 years ago
- A python wrapper around https://cve.circl.lu.☆55Updated 4 months ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆105Updated 7 years ago
- ☆48Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- ☆141Updated last year
- Cleans out "open" wireless connections from OSX machine☆154Updated 5 years ago
- Collection of Auditd Examples and Presentations☆87Updated 5 years ago