A simple touchID prompt'er for use in shell scripts.
☆99Jun 18, 2024Updated last year
Alternatives and similar repositories for tidcli
Users that are interested in tidcli are comparing it to the libraries listed below
Sorting:
- Munki Theme Maker allows you to create custom color based scheme themes for Munki.☆11Jul 28, 2024Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆119Updated this week
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Jul 8, 2024Updated last year
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆23Updated this week
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆137May 7, 2025Updated 10 months ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated this week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Updated this week
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 3 years ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Aug 5, 2025Updated 7 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆161Nov 21, 2024Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Okta Verify and Okta FastPass Abuse Tool☆341Sep 4, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!☆701Dec 6, 2025Updated 3 months ago
- ☆17Jan 9, 2025Updated last year
- ☆92Dec 15, 2025Updated 3 months ago
- ☆53Oct 27, 2024Updated last year
- ☆10Mar 14, 2026Updated last week
- ☆10Aug 11, 2025Updated 7 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated last month
- A python GUI application that provides framework & automation to secure macOS applications with exceptional requirements.☆11Feb 4, 2021Updated 5 years ago
- ☆40Aug 2, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- LLM Testing Findings Templates☆75Feb 14, 2024Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated last month
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Mar 12, 2026Updated last week
- ☆382Apr 18, 2024Updated last year
- Protect against subdomain takeover☆95Jul 20, 2025Updated 8 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year