ericalexanderorg / SecurityBreachLinks
Catalog of security breaches
☆25Updated 7 months ago
Alternatives and similar repositories for SecurityBreach
Users that are interested in SecurityBreach are comparing it to the libraries listed below
Sorting:
- A tool to spider Github or search URLs for various information leaks☆34Updated 2 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆44Updated 4 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- Create complex tools execution Workflows for working together☆23Updated 4 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated 2 years ago
- Simple golang shodan cli☆49Updated 4 years ago
- DNS caching for humans☆94Updated 3 years ago
- Crawlium: A crawling platform based on Chrome (Chromium) browser to get a deeper look into the ecosystem of content inclusion on the Web.☆53Updated 2 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆86Updated 4 years ago
- ☆18Updated 5 years ago
- GCP and GSUITE security auditing scripts☆27Updated last year
- A Passive SSH back-end and scanner.☆104Updated 4 months ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 4 months ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆78Updated last year
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- Create automated tasks and keep an eye on interesting things!☆85Updated 8 months ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Updated 8 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 4 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆72Updated 5 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆144Updated 2 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated 3 months ago
- Maltego Transforms to Query Traffic Records☆34Updated 10 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆21Updated last year
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 8 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Smart piping of command output to email for alerting.☆20Updated 5 years ago