A cyber security-focused playing card game
☆18Jan 27, 2021Updated 5 years ago
Alternatives and similar repositories for ThreatDeck
Users that are interested in ThreatDeck are comparing it to the libraries listed below
Sorting:
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- A collection of utilities to simplify the creation of Burp Suite plugins☆22Dec 14, 2023Updated 2 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- A library for building tools to determine if vulnerabilities are reachable in a code base.☆17Aug 19, 2025Updated 7 months ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Dump exposed HTTP .git fast☆51Nov 11, 2022Updated 3 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Feb 12, 2020Updated 6 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- Sleep obfuscation in golang based on ekko☆14Jan 16, 2024Updated 2 years ago
- ☆18Jan 20, 2021Updated 5 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- script to brute force ssh or ftp passwords☆12Jul 22, 2016Updated 9 years ago
- Burp Suite plugin that adds additional checks to the passive scanner to reveal the origin IP(s) of Cloudflare-protected web applications.☆62Nov 29, 2022Updated 3 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- GraphQL automatic fuzzing tool☆16Jul 16, 2021Updated 4 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Script to help enumerate and dig through Github and Github Enterprise installations.☆15Nov 30, 2018Updated 7 years ago