berylliumsec / eclipseLinks
AI Powered Sensitive Information Detection
☆19Updated last year
Alternatives and similar repositories for eclipse
Users that are interested in eclipse are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆22Updated 11 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆16Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 5 months ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- PoC repository for CVE-2023-29007☆33Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆17Updated last week
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- PoC☆12Updated 3 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated last year
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆57Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Updated last year
- ☆11Updated 5 months ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated last week
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago