audibleblink / kh
Keyhack - Golang API token/webhook validator
☆16Updated last month
Alternatives and similar repositories for kh:
Users that are interested in kh are comparing it to the libraries listed below
- Rosie the Pivoter☆17Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- ☆20Updated 6 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- ☆33Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Network Finger Printer☆16Updated 7 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- Hacky linux memory probe. Yara or Regex scan process memory☆11Updated last year
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- Provides access to libhashcat☆30Updated last year
- Automated deployment and configuration of a Mythic server using Terraform and Ansible☆9Updated 2 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Updated 3 years ago
- Run commands over RDP on massive number of hosts☆11Updated 6 years ago
- Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts☆26Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆60Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18Updated 5 years ago
- lightweight CVE search☆21Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- ☆16Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- fast, zero config web endpoint change monitor☆43Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- A better dns bruteforcer written in golang☆13Updated 6 years ago