aydinnyunus / GitleaksVerifierLinks
GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets flagged during code scans.
☆24Updated 2 months ago
Alternatives and similar repositories for GitleaksVerifier
Users that are interested in GitleaksVerifier are comparing it to the libraries listed below
Sorting:
- Manage attack surface data on Elasticsearch☆22Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated 2 weeks ago
- A web security research tool for DOM testing☆21Updated this week
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆52Updated 2 weeks ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆32Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- ☆17Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 4 months ago
- ☆20Updated 2 years ago
- Sniffing out well-known threat groups☆28Updated 9 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆39Updated 4 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 10 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- A National Vulnerability Database (NVD) API query tool☆18Updated last year
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- ☆12Updated 3 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- ☆54Updated 4 months ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated last month
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 3 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- ☆28Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last month