berylliumsec / eclipseLinks
AI Powered Sensitive Information Detection
☆20Updated last year
Alternatives and similar repositories for eclipse
Users that are interested in eclipse are comparing it to the libraries listed below
Sorting:
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- 2022 CTF public release☆23Updated 3 years ago
- Cloud Exploit Framework☆113Updated 3 years ago
- My talks...☆25Updated 11 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- Automatic security vulnerability remediation for your code.☆64Updated this week
- ☆13Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- Damn Vulnerable SCA Application☆43Updated last week
- First iteration of ML based Feedback WAF☆59Updated last year
- Manage attack surface data on Elasticsearch☆24Updated 2 years ago
- ☆42Updated 2 months ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆65Updated 2 months ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆27Updated last month
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- ☆27Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated 3 months ago
- ☆116Updated 2 years ago
- ☆33Updated last year
- an Evil Java RMI Registry.☆51Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 4 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆34Updated last year