red-kite-solutions / stalker
Stalker, the Extensible Attack Surface Management tool.
☆78Updated this week
Related projects ⓘ
Alternatives and complementary repositories for stalker
- A Powerful Network Reconnaissance Tool for Security Professionals☆94Updated 3 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 2 weeks ago
- Nuclei plugins to audit Chrome extensions☆64Updated 3 months ago
- a hackbot proof-of-concept☆34Updated 8 months ago
- A Pentest Collaboration and Reporting Tool☆49Updated last week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- Canary Detection☆160Updated 7 months ago
- Identify hardcoded secrets in static structured text (version 2)☆86Updated this week
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆77Updated 3 months ago
- God Mode Detection Rules☆130Updated 3 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆69Updated 8 months ago
- Dredging up secrets from the depths of the file system☆116Updated this week
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆33Updated 8 months ago
- Halberd : Multi-Cloud Attack Tool☆193Updated this week
- Living Off Security Tools☆37Updated 2 weeks ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 11 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆82Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆206Updated 2 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆39Updated 2 months ago
- A fast network scanning tool to detect open ports and security vulnerabilities☆97Updated last week
- Collection of Docker honeypot logs from 2021 - 2024☆35Updated last month
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆160Updated this week
- Search for sensitive data in Postman public library.☆185Updated 3 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆228Updated 7 months ago
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆83Updated last month
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 9 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆92Updated 11 months ago
- This is a RSS feed collection for all the InfoSec Content Creators☆30Updated last year
- ☆40Updated 2 months ago
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆142Updated this week