pownjs / gitLinks
Assorted tools for security-related task for git repositories
☆59Updated 3 years ago
Alternatives and similar repositories for git
Users that are interested in git are comparing it to the libraries listed below
Sorting:
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Fetch the details of assets hosted on AWS.☆88Updated last year
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.☆58Updated 5 years ago
- Burp Extension for AWS Signing☆88Updated 4 months ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- ☆126Updated 10 months ago
- Manual JavaScript Linting is a Bug☆49Updated 4 years ago
- ☆90Updated 3 years ago
- ☆23Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Send notifications on different channels such as Slack, Telegram, Discord etc.☆39Updated 2 years ago
- CircleCI log and security configuration automations☆22Updated 4 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Updated 5 years ago
- ☆125Updated 5 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 4 years ago
- retrive metadata endpoint data with these one liners.☆38Updated 4 years ago
- Go fish for AWS EIPs☆46Updated 4 years ago
- A basic golang server/client for distributing tasks over multiple systems.☆38Updated 4 years ago
- Push notifications for passive DNS data☆109Updated 9 years ago
- AWS Security Checks☆39Updated 7 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 3 years ago
- ☆44Updated 4 years ago
- A tool to evaluate Content Security Policies.☆71Updated 4 years ago
- Security checks for http headers and cookies☆25Updated 4 years ago
- WAF bypass PoC☆47Updated last year
- An Evil OIDC Server☆53Updated 2 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 3 years ago