Gixy-Next: NGINX Configuration Security Scanner & Performance Checker
☆153Feb 26, 2026Updated last week
Alternatives and similar repositories for Gixy-Next
Users that are interested in Gixy-Next are comparing it to the libraries listed below
Sorting:
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- Configure and deploy AWS Security Hub.☆16Jul 28, 2023Updated 2 years ago
- A tool for folks who `git clone` first and ask questions later☆66Sep 12, 2025Updated 5 months ago
- 🛡️ High-performance WAF & CDN detection tool with effectiveness testing suite. Identify protection layers (Cloudflare, Akamai, AWS) and …☆107Feb 22, 2026Updated last week
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 3 months ago
- Ansible module to perform RFC 2136 dynamic DNS updates☆32Aug 10, 2016Updated 9 years ago
- ☆25Feb 20, 2026Updated 2 weeks ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- ☆39Jul 31, 2025Updated 7 months ago
- Cloud (IaC) Security plugin for JetBrains IDEs (e.g., IntelliJ IDEA, PyCharm)☆36Feb 7, 2026Updated last month
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Feb 25, 2026Updated last week
- Red Team tools containerized☆76Dec 6, 2025Updated 3 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆397Aug 18, 2025Updated 6 months ago
- Time zones for fugit and rufus-scheduler. Urbi et Orbi.☆26Feb 25, 2026Updated last week
- AWS Attack Path Scanner - Discover privilege escalation paths across 10+ AWS services☆141Dec 4, 2025Updated 3 months ago
- ☆94Dec 25, 2025Updated 2 months ago
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆35Sep 30, 2025Updated 5 months ago
- ☆68Jan 1, 2026Updated 2 months ago
- Serverless full-stack React app on GCP☆30Sep 20, 2025Updated 5 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆137May 7, 2025Updated 10 months ago
- ☆42Nov 13, 2025Updated 3 months ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- 💅🏽 analyzes your github actions☆98Feb 9, 2026Updated 3 weeks ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆35Feb 27, 2026Updated last week
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆232Dec 18, 2025Updated 2 months ago
- ☆10Jun 16, 2021Updated 4 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- ☆13Apr 12, 2019Updated 6 years ago
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated 11 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 7 months ago
- ☆11May 1, 2024Updated last year
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 3 months ago
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆203Dec 20, 2025Updated 2 months ago
- ☆40Aug 2, 2024Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago