Git module to prevent from committing sensitive information into the repository.
☆51Aug 22, 2017Updated 8 years ago
Alternatives and similar repositories for git-seekret
Users that are interested in git-seekret are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- All the excellent centers☆17Aug 4, 2025Updated 7 months ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Go library and command line to seek for secrets on various sources.☆242Nov 14, 2019Updated 6 years ago
- DNS configuration for domains managed by GSA TTS☆49Jan 13, 2026Updated 2 months ago
- Example code and files for the MyoWare™ Bionic 3D Printed Claws tutorial☆13May 26, 2015Updated 10 years ago
- Python object inspector☆16Sep 5, 2022Updated 3 years ago
- 👀 Analyze Websites and Resources They Request☆23Feb 3, 2019Updated 7 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Python wrapper for the whitepages api. For more information about the whitepages api see their documentation at http://pro.whitepages.com…☆12Apr 27, 2015Updated 10 years ago
- ☆11Jun 10, 2020Updated 5 years ago
- Easy-as RPC. Zero-server RPC for Python and Java.☆44Aug 23, 2016Updated 9 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆13May 30, 2017Updated 8 years ago
- nexpose python client library☆10Oct 12, 2019Updated 6 years ago
- BadProxy is the tool which show a man in middle attack over the internet over the proxy☆10Mar 31, 2018Updated 7 years ago
- Draw AWS network graph with Graphviz.☆17Apr 3, 2014Updated 11 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆16Mar 20, 2013Updated 13 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- repo with compromised keys and such☆23Dec 29, 2022Updated 3 years ago
- AWS CloudWatch Events Collector☆13Feb 3, 2026Updated last month
- Markov chain generator in Dart☆35Nov 20, 2018Updated 7 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Reassembles UDP/TCP packets into application layer messages.☆42Mar 28, 2018Updated 7 years ago
- Net Commander supercharges Visual Studio Code for Network Engineers, DevOps Engineers and Solution Architects streamlining everyday workf…☆24Feb 19, 2026Updated last month
- Code repo for mapping tool that allows users to play with components of composite indexed indicator, such as social vulnerability.☆12Dec 3, 2022Updated 3 years ago
- Public docs and templates for managing incident lifecycle.☆30Jan 23, 2017Updated 9 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Awesome Security Feeds a curated, structured and automation-friendly collection of security RSS/Atom sources. Based on https://securityfe…☆29Updated this week
- Executables that execute other stuff☆54Jul 6, 2018Updated 7 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Aug 11, 2021Updated 4 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Feb 27, 2025Updated last year