A simple touchID prompt'er for use in shell scripts.
☆99Jun 18, 2024Updated last year
Alternatives and similar repositories for tidcli
Users that are interested in tidcli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Munki Theme Maker allows you to create custom color based scheme themes for Munki.☆11Jul 28, 2024Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆122Apr 18, 2026Updated last week
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆182Jul 8, 2024Updated last year
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆23Apr 20, 2026Updated last week
- Simple reverse ICMP shell☆14Apr 30, 2024Updated 2 years ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated this week
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆138May 7, 2025Updated 11 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆102Updated this week
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆47Aug 5, 2025Updated 8 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Okta Verify and Okta FastPass Abuse Tool☆342Sep 4, 2024Updated last year
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆163Nov 21, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!☆703Dec 6, 2025Updated 4 months ago
- ☆16Jan 9, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆93Dec 15, 2025Updated 4 months ago
- ☆54Oct 27, 2024Updated last year
- ☆10Updated this week
- ☆10Aug 11, 2025Updated 8 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆87Apr 7, 2026Updated 3 weeks ago
- A python GUI application that provides framework & automation to secure macOS applications with exceptional requirements.☆11Feb 4, 2021Updated 5 years ago
- ☆40Aug 2, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- LLM Testing Findings Templates☆73Feb 14, 2024Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated 2 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Apr 20, 2026Updated last week
- ☆383Apr 15, 2026Updated 2 weeks ago
- Protect against subdomain takeover☆95Updated this week
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year