apuigsech / git-seekretLinks
Git module to prevent from committing sensitive information into the repository.
☆51Updated 8 years ago
Alternatives and similar repositories for git-seekret
Users that are interested in git-seekret are comparing it to the libraries listed below
Sorting:
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 9 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Updated 10 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- REST API test utility☆22Updated 6 years ago
- ☆12Updated 8 years ago
- Repository for Security Workshop content☆20Updated 8 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -☆44Updated 6 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- ☆78Updated 10 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Updated 8 years ago
- A More or less Random Collection of Scripts for security Testing.☆64Updated 3 years ago
- Easy to use command line security scanner☆58Updated 9 years ago
- ☆27Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Minion☆355Updated 6 years ago
- sleepy puppy docker setup☆45Updated 7 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 6 months ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago