Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates
☆20Dec 15, 2021Updated 4 years ago
Alternatives and similar repositories for gcert
Users that are interested in gcert are comparing it to the libraries listed below
Sorting:
- ☆15Nov 4, 2020Updated 5 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- ☆23May 22, 2023Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- ☆23Mar 29, 2022Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- Externalize Java application access to protected resources as log messages.☆43Jan 22, 2026Updated last month
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆124Feb 22, 2026Updated last week
- Validates priv escalation of AD trusts☆48Apr 1, 2025Updated 11 months ago
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 9 months ago
- Automated social media post sharing☆11Jan 5, 2022Updated 4 years ago
- ☆12Jul 14, 2025Updated 7 months ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- token exchange as a service☆11Feb 23, 2026Updated last week
- https://z-r0crypt.github.io☆11May 3, 2024Updated last year
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- ☆12Feb 9, 2025Updated last year
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last week
- ☆11Oct 30, 2019Updated 6 years ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 5 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Generate really tiny text☆12Oct 21, 2019Updated 6 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Personal dotfiles, scripts, libraries, and documentation☆17Feb 14, 2026Updated 2 weeks ago
- ☆13Mar 27, 2021Updated 4 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆49Mar 29, 2023Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Mar 2, 2022Updated 4 years ago
- X Developer Challenge☆11Apr 25, 2024Updated last year