thinkst / canaryfyLinks
Linux file read monitor
☆91Updated 2 years ago
Alternatives and similar repositories for canaryfy
Users that are interested in canaryfy are comparing it to the libraries listed below
Sorting:
- Repo for autosnort scripts.☆157Updated 5 years ago
- Transparent network tap☆120Updated 10 years ago
- ☆208Updated 7 years ago
- a grep -r for secrets☆178Updated 3 years ago
- ☆78Updated 10 years ago
- ☆147Updated 9 years ago
- Various Cheat Sheets related to development and security☆143Updated 5 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆384Updated 5 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- ☆142Updated last year
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Vulnerability Data in ES☆144Updated 8 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- ☆104Updated 6 years ago
- Fast http dead file finder.☆217Updated 4 months ago
- A Slack bot to add security info to messages containing URLs, hashes and IPs☆71Updated last year
- For importing, searching, and managing public password breach data☆161Updated 2 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆100Updated 6 years ago
- Competition Infrastructure Management☆87Updated 4 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Automatic firewall rule orchestator.☆83Updated 8 years ago