ericalexanderorg / SecurityBreach
Catalog of security breaches
☆22Updated 2 months ago
Alternatives and similar repositories for SecurityBreach:
Users that are interested in SecurityBreach are comparing it to the libraries listed below
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated 8 years ago
- Outputs vs. outcomes: what's the different and why does it matter?☆15Updated last year
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- ☆27Updated 7 years ago
- dev level ;-)☆10Updated 6 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- A small collection of AWS utilities, packaged as a single standalone binary.☆14Updated last year
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆35Updated 7 years ago
- Tools and libraries for interacting with the Netograph API☆43Updated last year
- A curated collection of tools and resources for building security with a developer first approach.☆28Updated 2 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆27Updated last month
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 3 years ago
- Smart piping of command output to email for alerting.☆20Updated 4 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- A Go client for crobat☆23Updated 4 years ago
- GO sandbox to run untrusted code☆40Updated 5 years ago
- ☆33Updated last year
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- a Modular web penetration testing interface☆15Updated last year
- public DNS data yielder☆21Updated last year
- A low/zero interaction ssh authentication logging honeypot☆19Updated 5 months ago
- A tool to spider Github or search URLs for various information leaks☆33Updated last year
- D4 core software (server and sample sensor client)☆43Updated last year