leaktk / patternsLinks
Leak patterns for LeakTK tools to use
☆8Updated 3 weeks ago
Alternatives and similar repositories for patterns
Users that are interested in patterns are comparing it to the libraries listed below
Sorting:
- Things that would cause a git leaks scan to freak out☆13Updated last month
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 6 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 3 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last month
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 3 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- ☆15Updated 4 months ago
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 4 months ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆18Updated 7 months ago
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆19Updated 5 months ago
- The Jolly Executioner - a simple command execution proxy☆16Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 7 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 8 months ago
- ☆57Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- A security-first linter for code that shouldn't need linting☆16Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- ☆17Updated 7 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆23Updated last month
- ☆36Updated 10 months ago
- ☆12Updated 7 months ago
- A project to visualize the software supply chain☆51Updated last year
- ☆16Updated last month
- using ML models for red teaming☆43Updated last year
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago