Gixy-Next: NGINX Configuration Security Scanner & Performance Checker
☆161Mar 3, 2026Updated last month
Alternatives and similar repositories for Gixy-Next
Users that are interested in Gixy-Next are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 7 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆25Dec 28, 2025Updated 3 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- 🛡️ High-performance WAF & CDN detection tool. Identify protection layers (Cloudflare, Akamai, AWS, Fastly, and more), run effectiveness …☆111Mar 9, 2026Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Apr 8, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆39Jul 31, 2025Updated 8 months ago
- Configure and deploy AWS Security Hub.☆16Jul 28, 2023Updated 2 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 10 months ago
- Temodar Agent is an AI-powered WordPress plugin and theme security analysis platform built for security researchers, product security tea…☆56Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- mapsx 是一款端口扫描|网段探测|弱口令爆破工具☆22Nov 14, 2025Updated 5 months ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆104Feb 25, 2026Updated last month
- A Burp Suite extension for GraphQL security testing.☆61Mar 29, 2026Updated 3 weeks ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cloud (IaC) Security plugin for JetBrains IDEs (e.g., IntelliJ IDEA, PyCharm)☆35Apr 10, 2026Updated last week
- AWS Attack Path Scanner - Discover privilege escalation paths across 10+ AWS services☆146Dec 4, 2025Updated 4 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated 2 weeks ago
- ☆16May 3, 2021Updated 4 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- A place for personal ad hoc scripts☆10Jun 9, 2021Updated 4 years ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆101Jun 20, 2025Updated 9 months ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆51Jun 16, 2025Updated 10 months ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 💅🏽 analyzes your github actions☆98Apr 8, 2026Updated last week
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆250Dec 18, 2025Updated 4 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆413Aug 18, 2025Updated 8 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- Toolkit for creating cryptographic figures and videos.☆35May 17, 2024Updated last year
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Jan 7, 2020Updated 6 years ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 9 months ago
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 2 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆138May 7, 2025Updated 11 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Bash library for pretty-printing a variable given by name.☆19Jun 15, 2025Updated 10 months ago
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆35Sep 30, 2025Updated 6 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated last year
- Make your programs stealthier🐝☆204Jun 12, 2025Updated 10 months ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 5 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 5 months ago
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 5 months ago