GONZOsint / trufflehog-explorerView external linksLinks
TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.
☆53Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for trufflehog-explorer
Users that are interested in trufflehog-explorer are comparing it to the libraries listed below
Sorting:
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated last month
- Scripts that automate portions of pentests.☆57Updated this week
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Apr 13, 2025Updated 10 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 5 months ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆65Jun 10, 2025Updated 8 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- Backdooring VSCode Projects☆125Jun 5, 2025Updated 8 months ago
- ☆50May 4, 2025Updated 9 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆39Dec 2, 2025Updated 2 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Sample Random GitHub Repositories☆11Dec 27, 2025Updated last month
- ☆16Dec 7, 2025Updated 2 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆75Oct 27, 2025Updated 3 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆14Jan 25, 2026Updated 3 weeks ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- ☆38Apr 15, 2025Updated 10 months ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 8, 2026Updated last week
- Pdf-exploit builder Non-Silent on C#☆16Aug 31, 2024Updated last year
- Advanced test for proxy & waf☆13Sep 13, 2025Updated 5 months ago
- ☆17Jan 9, 2025Updated last year
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated 11 months ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- macOS dylib stager☆36Jan 22, 2025Updated last year
- ☆43Jul 17, 2025Updated 6 months ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Feb 8, 2026Updated last week
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Aug 8, 2025Updated 6 months ago
- A python library to create BloodHound OpenGraphs☆52Feb 4, 2026Updated last week
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Jun 12, 2019Updated 6 years ago
- ☆19Dec 18, 2024Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 6 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 7 months ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year