adeptex / whispers
Identify hardcoded secrets in static structured text (version 2)
☆90Updated last month
Alternatives and similar repositories for whispers:
Users that are interested in whispers are comparing it to the libraries listed below
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆103Updated 4 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆69Updated last month
- Nuclei plugins to audit Chrome extensions☆64Updated 8 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆98Updated 4 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 2 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆216Updated last week
- A web CTF for training developers in bug hunting and secure coding!☆97Updated 2 months ago
- ☆32Updated 7 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆154Updated 3 months ago
- Hijack a slack bot to phish your way in☆55Updated 3 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆103Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆134Updated 3 weeks ago
- Stalker, the Extensible Attack Surface Management tool.☆83Updated this week
- ☆164Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆75Updated last month
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆53Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆235Updated 2 weeks ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆156Updated 4 months ago
- A Pentest Collaboration and Reporting Tool☆57Updated 2 weeks ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆37Updated last month