Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.
☆13May 25, 2024Updated last year
Alternatives and similar repositories for TrailGuard
Users that are interested in TrailGuard are comparing it to the libraries listed below
Sorting:
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- ☆15Mar 3, 2021Updated 4 years ago
- A pair of tools that make testing for CSRF vulnerabilities simple and repeatable.☆16Oct 16, 2011Updated 14 years ago
- My step-by-step guide for setting up Linkerd 2 for real use.☆12Jan 17, 2023Updated 3 years ago
- A greybox fuzzer for continuous integration☆10Dec 15, 2023Updated 2 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 4 months ago
- Goby-Poc-Collection for Goby scanner https://github.com/gobysec/Goby - forked from many github accounts Thanks the authors☆12Dec 10, 2023Updated 2 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- Veeam RESTful API demo for Cloud Connect☆10Jun 23, 2016Updated 9 years ago
- ☆13Aug 12, 2022Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Prototype compiler from AWS CloudFormation IaC templates into Logic.☆13Dec 5, 2023Updated 2 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- Mac端的简易图床☆11Sep 5, 2017Updated 8 years ago
- explain why "Attempted relative import beyond toplevel package" is fired☆11Jan 16, 2016Updated 10 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Grepable cheat sheets for pentesting. Each sheet one tool.☆11Oct 15, 2020Updated 5 years ago
- Nginx real-time monitoring☆12Nov 20, 2024Updated last year
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- A simple script to detect unescaped characters in a web application for e.g. Cross Site Scripting (XSS) attacks.☆10Aug 20, 2020Updated 5 years ago
- A parser/timeline creator for auditd logs.☆16Aug 5, 2014Updated 11 years ago
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆24Sep 28, 2025Updated 5 months ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 5 months ago
- IT Security tools☆12Nov 12, 2021Updated 4 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆29Jan 29, 2026Updated last month
- Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite.☆11Aug 20, 2023Updated 2 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆11Dec 6, 2025Updated 2 months ago
- bypass SSL Pining ( Andriod emulator & burpsuite with frida)☆18Nov 10, 2022Updated 3 years ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago