Gixy-Next: NGINX Configuration Security Scanner & Performance Checker
☆157Mar 3, 2026Updated 3 weeks ago
Alternatives and similar repositories for Gixy-Next
Users that are interested in Gixy-Next are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 6 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆24Dec 28, 2025Updated 2 months ago
- Control access to/from custom resources by their names with calico☆14Dec 1, 2023Updated 2 years ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27May 24, 2024Updated last year
- 🛡️ High-performance WAF & CDN detection tool. Identify protection layers (Cloudflare, Akamai, AWS, Fastly, and more), run effectiveness …☆111Mar 9, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆43Feb 27, 2026Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- ☆39Jul 31, 2025Updated 7 months ago
- Configure and deploy AWS Security Hub.☆16Jul 28, 2023Updated 2 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- ☆25Feb 20, 2026Updated last month
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆91Feb 16, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆42Nov 13, 2025Updated 4 months ago
- A Burp Suite extension for GraphQL security testing.☆60Feb 7, 2026Updated last month
- AI-powered security alert management that reduces noise and accelerates response time☆97Updated this week
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Feb 25, 2026Updated last month
- Cloud (IaC) Security plugin for JetBrains IDEs (e.g., IntelliJ IDEA, PyCharm)☆36Mar 15, 2026Updated last week
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated 2 months ago
- AWS Attack Path Scanner - Discover privilege escalation paths across 10+ AWS services☆146Dec 4, 2025Updated 3 months ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆16May 3, 2021Updated 4 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆101Jun 20, 2025Updated 9 months ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆52Jun 16, 2025Updated 9 months ago
- 💅🏽 analyzes your github actions☆99Feb 9, 2026Updated last month
- ☆71Jan 1, 2026Updated 2 months ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆242Dec 18, 2025Updated 3 months ago
- Red Team tools containerized☆76Dec 6, 2025Updated 3 months ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆137May 7, 2025Updated 10 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- Make your programs stealthier🐝☆203Jun 12, 2025Updated 9 months ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 4 months ago