PoC shadow SaaS and insecure credential detection system using a browser extension.
☆44May 8, 2026Updated last week
Alternatives and similar repositories for shade
Users that are interested in shade are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlueSky OSINT Tool☆15Dec 10, 2024Updated last year
- ☆24Mar 4, 2025Updated last year
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated 2 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆16May 2, 2026Updated 2 weeks ago
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated 3 weeks ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated last month
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 10 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆30Jul 11, 2025Updated 10 months ago
- Data about all known supply-chain attacks through history☆69Updated this week
- ☆18Jul 30, 2024Updated last year
- An index of publicly available and open-source threat detection rulesets.☆135Apr 17, 2025Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆86Apr 7, 2026Updated last month
- The official website for The Discord Analytics for Risks & Threats Project.☆23Dec 29, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 3 years ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆32Feb 23, 2026Updated 2 months ago
- Collection of all previous 1337UP CTF challenges.☆79Jan 6, 2025Updated last year
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆30Nov 26, 2025Updated 5 months ago
- ☆57Dec 13, 2025Updated 5 months ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- DNSSEC validating resolver library☆25Mar 17, 2026Updated 2 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Automate rule management for AWS Network Firewall☆17May 11, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆244Apr 28, 2026Updated 3 weeks ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 8 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆155Nov 14, 2025Updated 6 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆112Jul 21, 2025Updated 9 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆52Mar 10, 2025Updated last year
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆23Apr 13, 2026Updated last month
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated last year
- Set of PoC to abuse Windows minifilters functionality