Samsung / CredSweeperLinks
CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of credentials (such as token, passwords, api keys etc.) in advance. By scanning lines, filtering, and using AI model as option, CredSweeper reports lines with possible credentials, where the line is, and expected typ…
☆137Updated 2 weeks ago
Alternatives and similar repositories for CredSweeper
Users that are interested in CredSweeper are comparing it to the libraries listed below
Sorting:
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆45Updated last week
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- Vulnogram is a tool for creating and editing CVE information in CVE JSON format☆203Updated this week
- Linux upstream vulnerabilities data suitable for dep-scan☆20Updated this week
- Simple Chatbot for testing AI Red Team tooling☆14Updated 8 months ago
- A Python library and command line interface for CVE Services.☆69Updated 2 weeks ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Payloads for Attacking Large Language Models☆102Updated 4 months ago
- An example vulnerable app that integrates an LLM☆24Updated last year
- https://arxiv.org/abs/2412.02776☆63Updated 10 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆85Updated 8 months ago
- ☆29Updated this week
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆33Updated 3 months ago
- Trail of Bits Testing Handbook☆82Updated 2 weeks ago
- OSS-Fuzz vulnerabilities for OSV.☆162Updated this week
- Sec-Gemini v1 is a cutting-edge AI model designed to enhance cybersecurity capabilities and empower defenders in the ongoing battle again…☆85Updated this week
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆38Updated 2 years ago
- Trends Website (URL) from Twitter hackers.☆105Updated this week
- Hourly updated database of exploit and exploitation reports☆255Updated 8 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆128Updated 2 months ago
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- Burp plugin for the 1Password session protocol for use by security researchers.☆72Updated 4 months ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆88Updated 4 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 2 months ago
- An Interface for AI built for cybersecurity professionals☆92Updated 8 months ago
- Drill into WARC web archives☆141Updated last year
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year