PoC shadow SaaS and insecure credential detection system using a browser extension.
☆42Feb 8, 2026Updated 2 weeks ago
Alternatives and similar repositories for shade
Users that are interested in shade are comparing it to the libraries listed below
Sorting:
- ☆23Mar 4, 2025Updated 11 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Detect drift. Defend cloud.☆36Updated this week
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 8 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- Collection of all previous 1337UP CTF challenges.☆78Jan 6, 2025Updated last year
- Automate rule management for AWS Network Firewall☆17Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated 3 weeks ago
- Stupid Simple Detection Testing☆13Mar 7, 2024Updated last year
- ☆52Dec 13, 2025Updated 2 months ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- ☆18Jul 30, 2024Updated last year
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆30Updated this week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 3 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆142Nov 14, 2025Updated 3 months ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated last month
- Scan GitHub Actions Workflow logs for IOCs☆16Feb 16, 2026Updated last week
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Updated this week
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Feb 2, 2026Updated 3 weeks ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 10 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- ☆86Feb 4, 2026Updated 3 weeks ago
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated last month
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆202Dec 20, 2025Updated 2 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 7 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109May 30, 2025Updated 8 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆173Jan 9, 2026Updated last month
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 5 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆516Feb 16, 2026Updated last week
- ☆23Sep 20, 2024Updated last year