GitGuardian / ggcanaryView external linksLinks
GitGuardian Canary Tokens
☆148Jun 30, 2025Updated 7 months ago
Alternatives and similar repositories for ggcanary
Users that are interested in ggcanary are comparing it to the libraries listed below
Sorting:
- Extract git related information (file shas, commit shas) from your hosted source version control system☆23Jan 31, 2024Updated 2 years ago
- Scan for leaked secrets during the s1ngularity attack using GitGuardian HasMySecretLeaked☆24Sep 4, 2025Updated 5 months ago
- Python API client library for the GitGuardian API☆86Jan 28, 2026Updated 2 weeks ago
- MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential le…☆30Updated this week
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- Stop leaks. Safeguard your secrets with GitGuardian. GitGuardian actively prevents accidental exposure of sensitive information in your c…☆31Jan 28, 2026Updated 2 weeks ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Feb 5, 2026Updated last week
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Scripts and Lambdas to help with automated deployment of AWS Shield Advanced☆12Feb 11, 2022Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Apr 2, 2022Updated 3 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆173Jan 30, 2026Updated 2 weeks ago
- ☆55Apr 25, 2023Updated 2 years ago
- Honeybadger Red Edition☆13Sep 13, 2017Updated 8 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- A tool for folks who `git clone` first and ask questions later☆66Sep 12, 2025Updated 5 months ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Aug 19, 2022Updated 3 years ago
- A honey token manager and alert system for AWS.☆320Dec 19, 2021Updated 4 years ago
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- ☆41Nov 29, 2024Updated last year
- ☆228Jan 29, 2026Updated 2 weeks ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Updated this week
- A fast, simple, and powerful open-source utility tool for generating strong, unique, and random passwords. The Password Generator support…☆21Feb 7, 2026Updated last week
- Create Logstash events from the Okta API!☆19Nov 29, 2022Updated 3 years ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- ☆75Mar 19, 2025Updated 10 months ago
- ☆23Feb 20, 2023Updated 2 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- ☆24Mar 20, 2023Updated 2 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- Dynamically generate and hunt with Lacework LQL queries quickly and efficiently☆27Sep 29, 2023Updated 2 years ago
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆29Apr 3, 2024Updated last year
- Script for Forensic on Linux☆48Feb 1, 2016Updated 10 years ago