pownjs / gitLinks
Assorted tools for security-related task for git repositories
☆59Updated 3 years ago
Alternatives and similar repositories for git
Users that are interested in git are comparing it to the libraries listed below
Sorting:
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Fetch the details of assets hosted on AWS.☆89Updated last year
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.☆58Updated 6 years ago
- Burp Extension for AWS Signing☆89Updated 7 months ago
- Manual JavaScript Linting is a Bug☆49Updated 4 years ago
- AWS Security Checks☆40Updated 7 years ago
- ☆23Updated 3 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- ☆10Updated 6 years ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆67Updated 4 years ago
- ☆90Updated 3 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- A tool to evaluate Content Security Policies.☆72Updated 5 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- ☆128Updated 5 years ago
- A basic golang server/client for distributing tasks over multiple systems.☆38Updated 5 years ago
- ☆127Updated last year
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- ☆44Updated 5 years ago
- Burp with Friends☆103Updated 2 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 4 years ago
- Push notifications for passive DNS data☆109Updated 9 years ago
- CircleCI log and security configuration automations☆22Updated 4 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆76Updated 5 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆135Updated 3 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Updated 6 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago