ab / oncelerLinks
Onceler listens to your secrets and shares them exactly once.
☆22Updated 3 months ago
Alternatives and similar repositories for onceler
Users that are interested in onceler are comparing it to the libraries listed below
Sorting:
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 7 months ago
- A Mastodon bot that posts a list of new .gov registrations each day☆11Updated 2 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- ☆16Updated 4 years ago
- honest.security microsite☆41Updated 8 months ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆18Updated 2 years ago
- A small utility that keeps your Git repositories from leaking secrets, skipping hooks, or quietly drifting out of compliance. It’s design…☆32Updated 2 months ago
- Open-source vulnerability disclosure policy templates.☆68Updated 3 years ago
- ☆15Updated 3 years ago
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Updated last year
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated 2 months ago
- This is the Login.gov main website where the public is able to learn about their one account for government.☆42Updated last week
- Python client and module for Vulnerability-Lookup.☆14Updated last month
- Rex library for text generation and manipulation☆21Updated 9 months ago
- Identity developer dashboard☆27Updated this week
- a JavaScript plugin to warn users about links to private pages☆10Updated 3 years ago
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆17Updated 3 months ago
- A checklist of items to check, especially when inheriting a foreign network.☆29Updated 6 years ago
- ExtraHop public code examples☆36Updated last year
- Provides an overview of the inner file structure of a PDF☆24Updated 3 years ago
- ☆23Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated this week
- Scanner to identify dangling DNS records and subdomain takeovers☆50Updated last year
- ☆13Updated 4 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Updated 5 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Updated 3 years ago
- read the docs version of risk management☆27Updated 2 years ago
- Open YARA scan- and search engine☆25Updated 10 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated 2 years ago