Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.
☆13May 25, 2024Updated last year
Alternatives and similar repositories for TrailGuard
Users that are interested in TrailGuard are comparing it to the libraries listed below
Sorting:
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 6 months ago
- Nginx real-time monitoring☆12Nov 20, 2024Updated last year
- bypass SSL Pining ( Andriod emulator & burpsuite with frida)☆18Nov 10, 2022Updated 3 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆17Jul 9, 2025Updated 8 months ago
- web指纹识别☆16Dec 27, 2022Updated 3 years ago
- A Python tool to manage GitHub Organizations and perform backup☆21Jan 6, 2026Updated 2 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆21Feb 19, 2026Updated last month
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆22Mar 18, 2025Updated last year
- A pair of tools that make testing for CSRF vulnerabilities simple and repeatable.☆16Oct 16, 2011Updated 14 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- ☆11Mar 9, 2018Updated 8 years ago
- Grepable cheat sheets for pentesting. Each sheet one tool.☆11Oct 15, 2020Updated 5 years ago
- ☆13Aug 12, 2022Updated 3 years ago
- ☆18Apr 3, 2023Updated 2 years ago
- ☆26Dec 4, 2023Updated 2 years ago
- Local CLI tool for browser extension risk analysis☆27Apr 11, 2025Updated 11 months ago
- ☆15Mar 3, 2021Updated 5 years ago
- A simple script to detect unescaped characters in a web application for e.g. Cross Site Scripting (XSS) attacks.☆10Aug 20, 2020Updated 5 years ago
- Beautiful plots in your terminal.☆32Jul 26, 2025Updated 7 months ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆19Aug 10, 2019Updated 6 years ago
- My step-by-step guide for setting up Linkerd 2 for real use.☆12Jan 17, 2023Updated 3 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆26Dec 7, 2023Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 2 years ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆17Feb 4, 2021Updated 5 years ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago
- Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite.☆11Aug 20, 2023Updated 2 years ago
- Based on shawarkhanethicalhacker/BruteXSS☆15Jan 24, 2019Updated 7 years ago
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆25Sep 28, 2025Updated 5 months ago
- IT Security tools☆12Nov 12, 2021Updated 4 years ago
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Crack Everything for CrackMapExec version 6☆22Jul 1, 2024Updated last year
- awsbe☆17Jun 1, 2022Updated 3 years ago
- Veeam RESTful API demo for Cloud Connect☆10Jun 23, 2016Updated 9 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago