☆72Oct 24, 2025Updated 4 months ago
Alternatives and similar repositories for safehttpx
Users that are interested in safehttpx are comparing it to the libraries listed below
Sorting:
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆174Jan 9, 2026Updated 2 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- ☆18Feb 2, 2026Updated last month
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 5 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Dec 12, 2024Updated last year
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆105Feb 6, 2025Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- A multi-vault secret injection tool for safely injecting secrets into app environment☆133Mar 2, 2026Updated 3 weeks ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Living Off Security Tools☆59Nov 23, 2025Updated 3 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- 🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️☆227May 22, 2023Updated 2 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Feb 25, 2026Updated 3 weeks ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- ☆40Nov 29, 2024Updated last year
- ☆14Jan 8, 2026Updated 2 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 10 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- FrogPost: postMessage Security Testing Tool☆108Dec 4, 2025Updated 3 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 10 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆118Aug 9, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆109Dec 3, 2025Updated 3 months ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆94Feb 10, 2026Updated last month
- Data about all known supply-chain attacks through history☆64May 28, 2025Updated 9 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Feb 6, 2025Updated last year
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- ☆23Mar 4, 2025Updated last year