ericalexanderorg / SecurityBreachLinks
Catalog of security breaches
☆24Updated 9 months ago
Alternatives and similar repositories for SecurityBreach
Users that are interested in SecurityBreach are comparing it to the libraries listed below
Sorting:
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated last month
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆86Updated 4 years ago
- Simple golang shodan cli☆49Updated 4 years ago
- A tool to spider Github or search URLs for various information leaks☆34Updated 2 years ago
- The Swiss Army knife for backend engineers.☆95Updated 4 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆44Updated 4 years ago
- Create automated tasks and keep an eye on interesting things!☆86Updated 3 weeks ago
- Golang-based subdomain miner leveraging certificate transparency logs☆74Updated 2 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆73Updated 6 years ago
- Crawlium: A crawling platform based on Chrome (Chromium) browser to get a deeper look into the ecosystem of content inclusion on the Web.☆53Updated 2 years ago
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.☆19Updated 3 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆80Updated last year
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 7 months ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Gather information on Wiki contributions from IP ranges☆23Updated 7 years ago
- A library for classifying strings as potential secrets.☆64Updated 4 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 8 years ago
- ☆18Updated 5 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆112Updated 5 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 5 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- personal fork of OSINT tool recon-ng☆16Updated 8 years ago
- a Modular web penetration testing interface☆15Updated 2 years ago
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 8 months ago
- GCP and GSUITE security auditing scripts☆27Updated last year
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆108Updated this week
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 7 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 6 years ago