red-kite-solutions / stalker
Stalker, the Extensible Attack Surface Management tool.
☆83Updated last week
Alternatives and similar repositories for stalker:
Users that are interested in stalker are comparing it to the libraries listed below
- Nuclei plugins to audit Chrome extensions☆64Updated 9 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 3 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated last year
- A collection of Turbo Intruder scripts.☆57Updated 2 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆68Updated last week
- Hijack a slack bot to phish your way in☆55Updated last week
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆86Updated 6 months ago
- Canary Detection☆167Updated last year
- Dredging up secrets from the depths of the file system☆125Updated 5 months ago
- A Pentest Collaboration and Reporting Tool☆59Updated last month
- FrogPost: postMessage Security Testing Tool☆50Updated this week
- Burp Suite extension for testing Passkey systems.☆66Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated 11 months ago
- Identify hardcoded secrets in static structured text (version 2)☆91Updated 2 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆79Updated this week
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆134Updated 2 weeks ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆156Updated 5 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 6 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆105Updated 5 months ago
- a hackbot proof-of-concept☆39Updated last year
- Putting a leash on naughty AWS permissions☆25Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆139Updated 3 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆81Updated 8 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆73Updated last month
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆86Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆166Updated 2 weeks ago
- Search for sensitive data in Postman public library.☆203Updated 3 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆241Updated 3 weeks ago