aydinnyunus / GitleaksVerifier
GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets flagged during code scans.
☆24Updated last month
Alternatives and similar repositories for GitleaksVerifier:
Users that are interested in GitleaksVerifier are comparing it to the libraries listed below
- Manage attack surface data on Elasticsearch☆22Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- ☆20Updated last year
- A web security research tool for DOM testing☆20Updated this week
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆30Updated 3 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 3 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 6 months ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆25Updated this week
- ☆32Updated 2 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆21Updated 6 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 8 months ago
- ☆28Updated last year
- ☆13Updated 6 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 10 months ago
- Additional active scan checks for BURP☆27Updated 6 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆34Updated 2 weeks ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- ☆37Updated 8 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- Collection of Tools & Techniques for analyzing URLs☆31Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 6 months ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated this week
- A National Vulnerability Database (NVD) API query tool☆18Updated last year