PoC shadow SaaS and insecure credential detection system using a browser extension.
☆42Apr 3, 2026Updated this week
Alternatives and similar repositories for shade
Users that are interested in shade are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆23Mar 4, 2025Updated last year
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated 2 weeks ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 8 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆28Jul 11, 2025Updated 8 months ago
- Data about all known supply-chain attacks through history☆65May 28, 2025Updated 10 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- ☆18Jul 30, 2024Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆85Updated this week
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated 3 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆32Feb 23, 2026Updated last month
- Collection of all previous 1337UP CTF challenges.☆79Jan 6, 2025Updated last year
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- ☆87Mar 30, 2026Updated last week
- ☆56Dec 13, 2025Updated 3 months ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- DNSSEC validating resolver library☆25Mar 17, 2026Updated 3 weeks ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Automate rule management for AWS Network Firewall☆17Mar 30, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆209Dec 20, 2025Updated 3 months ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆20Feb 23, 2026Updated last month
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆151Nov 14, 2025Updated 4 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆111Jul 21, 2025Updated 8 months ago
- ☆164Mar 20, 2026Updated 2 weeks ago
- ☆52Dec 20, 2025Updated 3 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆112May 30, 2025Updated 10 months ago
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- Fucking Fuck Mailman☆10Dec 28, 2015Updated 10 years ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆341Updated this week
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆174Jan 9, 2026Updated 3 months ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 3 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆541Apr 2, 2026Updated last week