ericalexanderorg / SecurityBreach
Catalog of security breaches
☆22Updated this week
Related projects: ⓘ
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆61Updated 5 years ago
- Smart piping of command output to email for alerting.☆20Updated 4 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 3 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆35Updated 7 years ago
- A fast http and https prober, to check which URLs are alive☆68Updated 5 years ago
- Extensible paste site scraper written in Golang.☆70Updated 3 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated last year
- A Go client for crobat☆23Updated 4 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆77Updated last year
- Create automated tasks and keep an eye on interesting things!☆78Updated last week
- A tool to run a command when the target of a symlink changes☆15Updated 8 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- Simple golang shodan cli☆48Updated 3 years ago
- public DNS data yielder☆21Updated last year
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 5 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 3 years ago
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Updated 5 years ago
- a Modular web penetration testing interface☆13Updated last year
- Gather information on Wiki contributions from IP ranges☆24Updated 6 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆64Updated 4 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆61Updated 6 years ago
- A list of backdoor samples I find online.☆13Updated 4 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- Yet Another Vulnerability Database☆14Updated 3 years ago
- Salesforce Policy Deviation Checker☆29Updated 3 years ago
- Tools and libraries for interacting with the Netograph API☆43Updated last year
- ☆27Updated 7 years ago
- A collection of scripts to explore domains and pick up information.☆12Updated 6 years ago