GitGuardian Canary Tokens
☆149Jun 30, 2025Updated 8 months ago
Alternatives and similar repositories for ggcanary
Users that are interested in ggcanary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Feb 13, 2024Updated 2 years ago
- ☆17Feb 3, 2026Updated last month
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Lateral Movement and Data Access artifacts for Velociraptor☆17Dec 2, 2025Updated 3 months ago
- A repo that contains links to projects by members of the Digital Forensics Discord Server! This is meant to help promote projects made by…☆16Oct 5, 2023Updated 2 years ago
- ☆23Feb 20, 2023Updated 3 years ago
- ☆55Apr 25, 2023Updated 2 years ago
- Resources for DFIR. And more.☆11Jul 3, 2024Updated last year
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆25Jun 19, 2017Updated 8 years ago
- ☆11May 1, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last week
- WIP - A tutorial for OWASP ZAP☆13Feb 12, 2020Updated 6 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆174Mar 2, 2026Updated 3 weeks ago
- A honey token manager and alert system for AWS.☆321Dec 19, 2021Updated 4 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- Collection of useful tools to analyse Google Analytics☆10Dec 11, 2015Updated 10 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Find exposed credentials using GitHub Actions with TruffleHog Enterprise.☆17Nov 21, 2024Updated last year
- ☆24Mar 20, 2023Updated 3 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆24Dec 28, 2025Updated 2 months ago
- ☆15May 22, 2023Updated 2 years ago
- Scripts and Lambdas to help with automated deployment of AWS Shield Advanced☆12Feb 11, 2022Updated 4 years ago
- A GitHub Action for using OX Security to scan for vulnerabilities in your software projects☆14Nov 12, 2024Updated last year
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- ☆229Mar 10, 2026Updated last week
- Publishes BOMs to Dependency-Track from GitHub Actions☆62Oct 7, 2024Updated last year
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆30Apr 3, 2024Updated last year
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- ☆143Feb 26, 2026Updated 3 weeks ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Mar 11, 2026Updated last week
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆42Sep 19, 2023Updated 2 years ago
- Monitor your code for exposed API keys, tokens, credentials, and high-risk security IaC misconfigurations☆19Sep 12, 2023Updated 2 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- ☆34Apr 29, 2021Updated 4 years ago
- A Software as a Service (SaaS) log collection framework.☆184Mar 16, 2026Updated last week
- Dynamically generate and hunt with Lacework LQL queries quickly and efficiently☆27Sep 29, 2023Updated 2 years ago
- ☆18Oct 4, 2020Updated 5 years ago