Samsung / CredSweeperLinks
CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of credentials (such as token, passwords, api keys etc.) in advance. By scanning lines, filtering, and using AI model as option, CredSweeper reports lines with possible credentials, where the line is, and expected typ…
☆132Updated this week
Alternatives and similar repositories for CredSweeper
Users that are interested in CredSweeper are comparing it to the libraries listed below
Sorting:
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆43Updated this week
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- Vulnogram is a tool for creating and editing CVE information in CVE JSON format☆198Updated 3 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆109Updated last month
- ☆29Updated this week
- quicmap is a simple yet quic (!) QUIC protocol scanner☆88Updated last year
- A ChatGPT based penetration testing findings generator.☆133Updated 2 years ago
- A LLM explicitly designed for getting hacked☆158Updated 2 years ago
- IOCs from Google Threat Intelligence☆33Updated 3 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆128Updated 2 weeks ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆124Updated 6 months ago
- Trail of Bits Testing Handbook☆79Updated 3 weeks ago
- Hourly updated database of exploit and exploitation reports☆260Updated 7 months ago
- CveXplore☆43Updated last week
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆211Updated 3 months ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- A Python library and command line interface for CVE Services.☆69Updated 2 weeks ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆113Updated 2 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆71Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆42Updated this week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆218Updated this week
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆29Updated 8 months ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆211Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆36Updated 2 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆15Updated 3 weeks ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- ATHI — An AI Threat Modeling Framework for Policymakers☆54Updated 2 years ago
- Payloads for Attacking Large Language Models☆96Updated 2 months ago