Samsung / CredSweeperLinks
CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of credentials (such as token, passwords, api keys etc.) in advance. By scanning lines, filtering, and using AI model as option, CredSweeper reports lines with possible credentials, where the line is, and expected typ…
☆147Updated this week
Alternatives and similar repositories for CredSweeper
Users that are interested in CredSweeper are comparing it to the libraries listed below
Sorting:
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆53Updated last week
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- Simple Chatbot for testing AI Red Team tooling☆16Updated 11 months ago
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆214Updated 2 weeks ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆76Updated 8 months ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆53Updated last year
- Sec-Gemini v1 is a cutting-edge AI model designed to enhance cybersecurity capabilities and empower defenders in the ongoing battle again…☆131Updated this week
- ☆31Updated this week
- CveXplore☆42Updated 4 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆135Updated this week
- Monthly CVE Stats☆44Updated last week
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated last year
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆81Updated 3 years ago
- Hourly updated database of exploit and exploitation reports☆259Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆114Updated 6 months ago
- Notus is a vulnerability scanner for creating results from local security checks☆61Updated this week
- OSS-Fuzz vulnerabilities for OSV.☆170Updated this week
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Updated 2 weeks ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆35Updated last year
- Archive of Potential Insider Threats☆153Updated 2 years ago
- RSS items as GitHub Issues for the discerning engineering leader or security professional☆65Updated this week
- A Content Discovery and Development Platform. Empowering Cybersecurity, AI, Marketing, and Finance professionals and researchers to disco…☆51Updated this week
- A Python library and command line interface for CVE Services.☆71Updated last week
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆102Updated 2 years ago
- ☆57Updated 2 weeks ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Updated last week
- SSE to Stdio MCP Proxy Server☆17Updated 8 months ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year