ericalexanderorg / SecurityBreach
Catalog of security breaches
☆25Updated last month
Alternatives and similar repositories for SecurityBreach
Users that are interested in SecurityBreach are comparing it to the libraries listed below
Sorting:
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆35Updated 8 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated 8 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- An enchanting 🔮 web screenshot tool for capturing and sharing web content effortlessly☆34Updated last month
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- Customizable Security Scanner written in Go☆16Updated 8 years ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- ☆18Updated 5 years ago
- Go package for resolving IP addresses back to published cloud provider public ranges☆28Updated 7 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆77Updated last year
- Docker container for Zachary Rice Gitleaks☆20Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 4 years ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 6 months ago
- A Go client for crobat☆24Updated 5 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- Scanner for public s3 buckets☆11Updated 7 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Updated 6 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- ☆10Updated 3 years ago