Samsung / CredSweeperLinks
CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of credentials (such as token, passwords, api keys etc.) in advance. By scanning lines, filtering, and using AI model as option, CredSweeper reports lines with possible credentials, where the line is, and expected typ…
☆134Updated this week
Alternatives and similar repositories for CredSweeper
Users that are interested in CredSweeper are comparing it to the libraries listed below
Sorting:
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- Vulnogram is a tool for creating and editing CVE information in CVE JSON format☆199Updated 4 months ago
- RSS items as GitHub Issues for the discerning engineering leader or security professional☆59Updated this week
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 7 months ago
- CLI tool for interacting with GPT, analyze local files, etc.☆15Updated 4 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆111Updated last month
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆42Updated this week
- A Python library and command line interface for CVE Services.☆69Updated this week
- Payloads for Attacking Large Language Models☆99Updated 3 months ago
- Sec-Gemini v1 is a cutting-edge AI model designed to enhance cybersecurity capabilities and empower defenders in the ongoing battle again…☆77Updated this week
- ☆29Updated this week
- CveXplore☆42Updated last week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆129Updated last month
- Trail of Bits Testing Handbook☆79Updated last month
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- Drill into WARC web archives☆141Updated 11 months ago
- An example vulnerable app that integrates an LLM☆24Updated last year
- Hourly updated database of exploit and exploitation reports☆258Updated 7 months ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆33Updated 2 months ago
- IOCs from Google Threat Intelligence☆33Updated 3 months ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆128Updated 6 months ago
- Tool to guess CPE name based on common software name☆104Updated this week
- Linux upstream vulnerabilities data suitable for dep-scan☆20Updated this week
- ☆75Updated 6 months ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆31Updated 8 months ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆72Updated 3 months ago
- A LLM explicitly designed for getting hacked☆160Updated 2 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year