Samsung / CredSweeperLinks
CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of credentials (such as token, passwords, api keys etc.) in advance. By scanning lines, filtering, and using AI model as option, CredSweeper reports lines with possible credentials, where the line is, and expected typ…
☆145Updated this week
Alternatives and similar repositories for CredSweeper
Users that are interested in CredSweeper are comparing it to the libraries listed below
Sorting:
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆52Updated last week
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- ☆28Updated this week
- OSS-Fuzz vulnerabilities for OSV.☆167Updated this week
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆212Updated this week
- https://arxiv.org/abs/2412.02776☆67Updated last year
- Linux upstream vulnerabilities data suitable for dep-scan☆21Updated this week
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆33Updated last month
- Simple Chatbot for testing AI Red Team tooling☆14Updated 10 months ago
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆73Updated last year
- An Interface for AI built for cybersecurity professionals☆93Updated 10 months ago
- A Python library and command line interface for CVE Services.☆71Updated 2 months ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- Sec-Gemini v1 is a cutting-edge AI model designed to enhance cybersecurity capabilities and empower defenders in the ongoing battle again…☆122Updated last week
- Daily updates from leaked data search engines, aggregators and similar services.☆132Updated this week
- Multi-agent system (MAS) hijacking demos☆39Updated last week
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆35Updated last year
- Trail of Bits Testing Handbook - appsec.guide☆87Updated this week
- A ChatGPT based penetration testing findings generator.☆134Updated 2 years ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆90Updated last year
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆47Updated this week
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 4 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 10 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆133Updated last week
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆76Updated last month
- RSS items as GitHub Issues for the discerning engineering leader or security professional☆63Updated this week
- Trends Website (URL) from Twitter hackers.☆110Updated this week
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆74Updated 6 months ago