☆79Aug 7, 2015Updated 10 years ago
Alternatives and similar repositories for ShadowBuster
Users that are interested in ShadowBuster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- Application whitelisting/blacklisting & end-user notifications for GSuite☆14Apr 19, 2018Updated 7 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Track public endpoints and connections across AWS accounts using VPC Flow Logs☆12Jun 14, 2016Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Find exposed credentials using GitHub Actions with TruffleHog Enterprise.☆17Nov 21, 2024Updated last year
- docker based telnet honeypot☆80Feb 19, 2018Updated 8 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- A command line utility for pattern matching similar to 'grep', but supports capture groups and multiline matches.☆19May 25, 2012Updated 13 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- Docker container to run PoisonTap☆15Dec 8, 2016Updated 9 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Honeypot Intelligence with Splunk☆255Oct 18, 2018Updated 7 years ago
- An open-source collection of API key rotation tutorials.☆78Feb 9, 2026Updated last month
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆16Jan 12, 2017Updated 9 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Jun 27, 2017Updated 8 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆136Mar 18, 2017Updated 9 years ago
- A centralized location for all presentations I've given at various conferences☆26Sep 1, 2017Updated 8 years ago
- in-memory fuzzing with gdb☆21Feb 10, 2016Updated 10 years ago
- Web App for Volatility framework☆386Jan 13, 2026Updated 2 months ago
- A bucket of various work-in-progress rtl-sdr ideas.☆22Mar 5, 2017Updated 9 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- Coraza WAF Gin-gonic middleware☆25Jun 17, 2022Updated 3 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]☆97Nov 12, 2013Updated 12 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆29May 23, 2023Updated 2 years ago
- Alienvault OTX TAXII connector☆57Apr 26, 2017Updated 8 years ago
- Cyber Threat Intelligence Feeds☆71May 3, 2024Updated last year