ericalexanderorg / SecurityBreach
Catalog of security breaches
☆23Updated last week
Alternatives and similar repositories for SecurityBreach:
Users that are interested in SecurityBreach are comparing it to the libraries listed below
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆35Updated 7 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- Repository to allow collaboration between Cycle Labs Cloud community in support of the community.☆9Updated 3 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 3 years ago
- Notebook collection☆10Updated 5 years ago
- A Go client for crobat☆24Updated 4 years ago
- a Modular web penetration testing interface☆15Updated last year
- ☆27Updated 7 years ago
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Updated 6 years ago
- 🌦️ Domain Ranker☆15Updated 5 years ago
- A fast http and https prober, to check which URLs are alive☆70Updated 5 years ago
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆22Updated 5 months ago
- Docker container for Zachary Rice Gitleaks☆20Updated 5 years ago
- Download files out of open AWS buckets☆37Updated 6 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Extensible paste site scraper written in Golang.☆71Updated 4 years ago
- Tools and libraries for interacting with the Netograph API☆43Updated last year
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 4 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Updated 4 years ago
- Auto updating archive of my Twitter lists.☆15Updated 2 months ago
- Create automated tasks and keep an eye on interesting things!☆82Updated this week
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆70Updated 5 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- experimental threat modeling tools☆14Updated 2 years ago