salesforce / lobster-potView external linksLinks
Scans every git push to your Github organisations to find unwanted secrets.
☆87May 1, 2025Updated 9 months ago
Alternatives and similar repositories for lobster-pot
Users that are interested in lobster-pot are comparing it to the libraries listed below
Sorting:
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- ☆30Jan 13, 2026Updated last month
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- ☆89Feb 11, 2022Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- find dangling domains in a multi cloud environment☆175Dec 25, 2025Updated last month
- ☆17May 16, 2022Updated 3 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 6 months ago
- Notes for High Availability MISP in AWS☆19Nov 6, 2019Updated 6 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆131Nov 10, 2023Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Dynamically generate and hunt with Lacework LQL queries quickly and efficiently☆27Sep 29, 2023Updated 2 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 4 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143May 1, 2025Updated 9 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- ☆10May 12, 2022Updated 3 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Dec 12, 2023Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- prometheus passenger exporter for nginx integration☆19Feb 27, 2024Updated last year
- Clean accounts over permissions in GCP infra at scale☆71May 9, 2023Updated 2 years ago
- ☆39May 21, 2022Updated 3 years ago
- all paths lead to clouds☆638Oct 11, 2023Updated 2 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- Example VBA Macro for MacOS Mojave☆66Oct 31, 2018Updated 7 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- Want to use your Gmail address to login to Vault? This demo shows you how!☆12Apr 9, 2019Updated 6 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 7 months ago
- A utility for recursively traversing SSL/TLS certificates for collecting DNS names☆48Aug 26, 2023Updated 2 years ago