aydinnyunus / GitleaksVerifierLinks
GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets flagged during code scans.
☆24Updated 4 months ago
Alternatives and similar repositories for GitleaksVerifier
Users that are interested in GitleaksVerifier are comparing it to the libraries listed below
Sorting:
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- Manage attack surface data on Elasticsearch☆22Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆54Updated last month
- A web security research tool for DOM testing☆21Updated this week
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆42Updated 6 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆41Updated 3 months ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated 2 months ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆20Updated 8 months ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆21Updated 11 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 6 months ago
- ☆17Updated 3 months ago
- ☆32Updated 2 years ago
- ☆28Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 9 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 2 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆43Updated 5 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 4 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago