pypi-data / pypi-aws-secrets
This repo scans pypi for AWS keys
☆105Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for pypi-aws-secrets
- A GitHub Action for pip-audit☆68Updated this week
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆286Updated this week
- An Open Letter to the OWASP Board☆106Updated last year
- Holds the public Hacking the Cloud CTFs.☆49Updated 8 months ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆67Updated 2 years ago
- S3 Account Search☆245Updated 3 weeks ago
- boostsecurityio/lotp☆100Updated 7 months ago
- ☆63Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆69Updated 8 months ago
- CQ, a code security scanner☆97Updated 5 months ago
- A domain name permutation and enumeration library powered by Rust.☆105Updated 3 weeks ago
- Manager of third-party sources of Semgrep rules 🗂☆76Updated 3 months ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated last year
- Vandalize old emails. Like an NFT that's easy to prove ownership of.☆34Updated last year
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆110Updated last year
- Find secrets in your codebase☆118Updated this week
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆98Updated last year
- An open-source collection of API key rotation tutorials.☆59Updated 2 months ago
- ☆110Updated last year
- Cloud agnostic IAM permissions enumerator☆139Updated 2 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆55Updated 7 months ago
- GitHub Attack Toolkit - Extreme Edition☆193Updated last week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆196Updated last month
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆43Updated 10 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated this week
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆39Updated 11 months ago
- Tools to assess DNS security.☆148Updated 8 months ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆150Updated 2 months ago