Skyscanner / whispers
Identify hardcoded secrets in static structured text
☆476Updated last year
Related projects ⓘ
Alternatives and complementary repositories for whispers
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆265Updated 2 months ago
- Threat matrix for CI/CD Pipeline☆739Updated 4 months ago
- Slack enumeration and exposed secrets detection tool☆366Updated this week
- A suite of secret scanners built in Rust for performance. Based on TruffleHog (https://github.com/dxa4481/truffleHog) which is written in…☆454Updated 2 months ago
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆808Updated last year
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆529Updated 7 months ago
- Scan your code for security misconfiguration, search for passwords and secrets.☆638Updated last year
- OWASP Domain Protect - prevent subdomain takeover☆398Updated last month
- Find secrets in your codebase☆119Updated 2 weeks ago
- Uncover forgotten secrets and bring them back to life, haunting security and operations teams.☆206Updated last year
- Private key usage verification☆410Updated 10 months ago
- Fully open-source SAST scanner supporting a range of languages and frameworks. Integrates with major CI pipelines and IDE such as Azure D…☆147Updated 4 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆592Updated 5 years ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆151Updated 2 months ago
- Documenting your Threat Models with HCL☆401Updated 2 months ago
- FestIn - Open S3 Bucket Scanner☆230Updated 3 years ago
- Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace☆729Updated 3 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆499Updated this week
- Kubernetes focused container assessment and context discovery tool for penetration testing☆439Updated 5 months ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆659Updated last year
- Open Cloud Security Posture Management Engine☆335Updated 2 years ago
- all paths lead to clouds☆632Updated last year
- A honey token manager and alert system for AWS.☆316Updated 2 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆96Updated 11 months ago
- Open source compliance tool for development platforms.☆286Updated last year
- Resource types that can be publicly exposed on AWS☆317Updated 2 years ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆775Updated last week
- WeirdAAL (AWS Attack Library)☆781Updated last year
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆861Updated this week
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆897Updated 5 years ago