AlexAkulov / hungryfox
Monitoring for leaks of sensitive information in git repositories
☆43Updated last year
Alternatives and similar repositories for hungryfox:
Users that are interested in hungryfox are comparing it to the libraries listed below
- Customizable Security Scanner written in Go☆16Updated 8 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆19Updated 6 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Burp Commander written in Go☆57Updated 6 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 3 years ago
- A tool to evaluate Content Security Policies.☆70Updated 4 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆77Updated last year
- ☆11Updated 7 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 4 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆35Updated 7 years ago
- Security checks for your researches☆33Updated 4 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- A horizontal and vertical web content enumerator☆51Updated 6 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆28Updated 5 years ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- Custom semgrep rules registry☆11Updated 2 years ago
- Masscan integrated with Shodan API☆41Updated 7 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Asynchronous HTTP pipelining directory buster☆22Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.☆64Updated 6 years ago
- A list of checks with tips for analyzing the security of Android applications☆12Updated 5 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago