ericalexanderorg / SecurityBreachLinks
Catalog of security breaches
☆25Updated 4 months ago
Alternatives and similar repositories for SecurityBreach
Users that are interested in SecurityBreach are comparing it to the libraries listed below
Sorting:
- The Swiss Army knife for backend engineers.☆97Updated 4 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- A tool to spider Github or search URLs for various information leaks☆34Updated 2 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆85Updated 4 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated 2 years ago
- Create automated tasks and keep an eye on interesting things!☆83Updated 5 months ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆19Updated 2 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆70Updated 5 years ago
- Create complex tools execution Workflows for working together☆22Updated 4 years ago
- Simple golang shodan cli☆49Updated 4 years ago
- GCP and GSUITE security auditing scripts☆27Updated last year
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- ☆18Updated 5 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 5 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- Crawlium: A crawling platform based on Chrome (Chromium) browser to get a deeper look into the ecosystem of content inclusion on the Web.☆53Updated last year
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- DNS caching for humans☆93Updated 3 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated last week
- Github stargazers information gathering tool☆171Updated last month
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆26Updated 3 months ago
- Let's brute force this hotel's tv.☆81Updated 5 years ago
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 3 months ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆77Updated 3 years ago
- List of Sanctions and Most wanted☆28Updated 8 years ago
- Customizable Security Scanner written in Go☆16Updated 9 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago