red-kite-solutions / stalker
Stalker, the Extensible Attack Surface Management tool.
☆83Updated last week
Alternatives and similar repositories for stalker:
Users that are interested in stalker are comparing it to the libraries listed below
- Nuclei plugins to audit Chrome extensions☆64Updated 8 months ago
- Hijack a slack bot to phish your way in☆55Updated 3 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆73Updated last month
- A Pentest Collaboration and Reporting Tool☆56Updated 2 weeks ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 2 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated last month
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆78Updated 7 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 2 months ago
- Identify hardcoded secrets in static structured text (version 2)☆90Updated last month
- a hackbot proof-of-concept☆38Updated last year
- Living Off Security Tools☆45Updated 4 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 5 months ago
- Canary Detection☆164Updated 11 months ago
- Protection against HTML smuggling attempts.☆92Updated last week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆51Updated last week
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated 7 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆156Updated 4 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆103Updated 4 months ago
- A research project to add some brrrrrr to Burp☆137Updated last month
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆69Updated 2 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆37Updated last month
- ☆40Updated 6 months ago