red-kite-solutions / stalkerLinks
Stalker, the Extensible Attack Surface Management tool.
☆86Updated last week
Alternatives and similar repositories for stalker
Users that are interested in stalker are comparing it to the libraries listed below
Sorting:
- A Pentest Collaboration and Reporting Tool☆63Updated 3 months ago
- Hijack a slack bot to phish your way in☆55Updated 2 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 11 months ago
- Identify hardcoded secrets in static structured text (version 2)☆91Updated 4 months ago
- Burp Suite extension for testing Passkey systems.☆69Updated 2 months ago
- FrogPost: postMessage Security Testing Tool☆80Updated last month
- Protection against HTML smuggling attacks.☆96Updated 2 weeks ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 3 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆162Updated 7 months ago
- Canary Detection☆182Updated last month
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 8 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated last week
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 5 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆143Updated last month
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆41Updated 5 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆93Updated 3 weeks ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆83Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆108Updated 7 months ago
- A collection of Turbo Intruder scripts.☆61Updated 4 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 10 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆251Updated last month
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆52Updated 4 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 3 months ago
- An index of publicly available and open-source threat detection rulesets.☆114Updated 2 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated 10 months ago
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆86Updated 9 months ago