leaktk / fake-leaksLinks
Things that would cause a git leaks scan to freak out
☆13Updated last month
Alternatives and similar repositories for fake-leaks
Users that are interested in fake-leaks are comparing it to the libraries listed below
Sorting:
- Leak patterns for LeakTK tools to use☆8Updated 3 weeks ago
- An open-source collection of API key rotation tutorials.☆70Updated 2 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last month
- An example vulnerable app that integrates an LLM☆21Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 6 months ago
- Automated vulnerability discovery and annotation☆67Updated 10 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 3 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 9 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆71Updated last month
- Trail of Bits Testing Handbook☆75Updated this week
- boostsecurityio/lotp☆126Updated last month
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- ☆67Updated 6 months ago
- ☆17Updated 7 months ago
- A meta-database collecting resources that compile lists of breaches☆20Updated 7 months ago
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 3 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆139Updated last month
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆65Updated last month
- ☆36Updated 10 months ago
- ☆111Updated 2 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆24Updated 8 months ago
- using ML models for red teaming☆43Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 8 months ago
- A tool to test cross-device authentication protocol security☆21Updated 3 months ago
- ☆15Updated 4 months ago
- A security-first linter for code that shouldn't need linting☆16Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 6 months ago
- ☆12Updated 7 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 8 months ago