Gixy-Next: NGINX Configuration Security Scanner & Performance Checker
☆163Mar 3, 2026Updated 2 months ago
Alternatives and similar repositories for Gixy-Next
Users that are interested in Gixy-Next are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for folks who `git clone` first and ask questions later☆68Apr 15, 2026Updated 3 weeks ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆25Dec 28, 2025Updated 4 months ago
- Control access to/from custom resources by their names with calico☆14Dec 1, 2023Updated 2 years ago
- Helm plugin to install and upgrade CRDs from the chart☆39Jan 3, 2024Updated 2 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🛡️ High-performance WAF & CDN detection tool. Identify protection layers (Cloudflare, Akamai, AWS, Fastly, and more), run effectiveness …☆111Mar 9, 2026Updated 2 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- ☆39Jul 31, 2025Updated 9 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 10 months ago
- Temodar Agent is an AI-powered WordPress plugin and theme security analysis platform built for security researchers, product security tea…☆57Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- ☆43Nov 13, 2025Updated 5 months ago
- ☆27Apr 14, 2026Updated 3 weeks ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆104Feb 25, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Burp Suite extension for GraphQL security testing.☆63Mar 29, 2026Updated last month
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 3 months ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- AWS Attack Path Scanner - Discover privilege escalation paths across 10+ AWS services☆148Dec 4, 2025Updated 5 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated last month
- ☆16May 3, 2021Updated 5 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆102Jun 20, 2025Updated 10 months ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 💅🏽 analyzes your github actions☆98Apr 28, 2026Updated last week
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆256Dec 18, 2025Updated 4 months ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Apr 26, 2026Updated last week
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- Toolkit for creating cryptographic figures and videos.☆35May 17, 2024Updated last year
- Mongoose OS based code to call links whenever the ESP is powered up☆11Jun 16, 2017Updated 8 years ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 10 months ago
- Saltstack formula for wireguard☆11Dec 22, 2025Updated 4 months ago
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆35Sep 30, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆138May 7, 2025Updated last year
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆253Oct 30, 2025Updated 6 months ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 6 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 5 months ago
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 5 months ago
- An index of publicly available and open-source threat detection rulesets.☆134Apr 17, 2025Updated last year
- ☆97Dec 25, 2025Updated 4 months ago