firefart / hijaggerLinks
Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration
☆304Updated last week
Alternatives and similar repositories for hijagger
Users that are interested in hijagger are comparing it to the libraries listed below
Sorting:
- ☆114Updated 2 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆282Updated 4 months ago
- boostsecurityio/lotp☆136Updated 3 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆141Updated 2 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated last week
- Tools to assess DNS security.☆153Updated last year
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated last year
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆191Updated last year
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆120Updated 2 years ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆155Updated last year
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆365Updated 5 months ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆258Updated last year
- a smart DNS response-guided subdomain fuzzer☆156Updated 3 years ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆722Updated 4 months ago
- Private key usage verification☆432Updated 9 months ago
- Secret Magpie - Secret Detection Tool☆246Updated last year
- OSINT tool for discovering the real IP addresses of services which are behind Cloudflare but not properly locked down☆153Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆180Updated last month
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 11 months ago
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- Scan DockerHub images that match a keyword to find secrets.☆61Updated 4 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆312Updated 3 months ago
- A small collection of potentially useful contract templates☆418Updated 3 weeks ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- CQ, a code security scanner☆100Updated last year
- Subdomain finder☆372Updated last year
- 🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️☆227Updated 2 years ago
- A GraphQL enumeration and extraction tool☆134Updated 3 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆448Updated 3 weeks ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆69Updated 4 years ago