tech-mojo / log-enhancerLinks
Extends and enhances console.log with various symbols and themes
☆10Updated 2 years ago
Alternatives and similar repositories for log-enhancer
Users that are interested in log-enhancer are comparing it to the libraries listed below
Sorting:
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,234Updated 2 weeks ago
- Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuos monitoring, security a…☆11,686Updated this week
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,726Updated 2 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,113Updated 4 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,196Updated 7 months ago
- Multi-Cloud Security Auditing Tool☆7,173Updated 6 months ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,092Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆1,496Updated 10 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,698Updated 8 months ago
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆6,158Updated 10 months ago
- Colored symbols for various log levels☆756Updated 2 weeks ago
- Cloud Security Posture Management (CSPM)☆3,538Updated last month
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆23,525Updated this week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆10,209Updated this week
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,186Updated 7 months ago
- This repo was created for the Java full stack learning using html-css-js as the FE, SpringBoot as BE and MongoDb as the Data Source☆8Updated 4 months ago
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆992Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,857Updated 2 weeks ago
- Directory/File, DNS and VHost busting tool written in Go☆11,930Updated 2 weeks ago
- ☆10Updated 2 weeks ago
- ☆16Updated 8 months ago
- nodejsscan is a static security code scanner for Node.js applications.☆2,469Updated 3 weeks ago
- IAM Least Privilege Policy Generator☆2,090Updated this week
- Retrieves findings with APPROVED mitigations from an application's policy scan (or sandbox) and creates a baseline file for Pipeline Scan…☆11Updated last year
- A curated list of Awesome Threat Intelligence resources☆8,852Updated 3 weeks ago
- List of Awesome Red Teaming Resources☆7,272Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,561Updated last month
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,199Updated 4 months ago
- Terraform scripts☆16Updated last year
- List of Awesome Asset Discovery Resources☆2,143Updated 4 months ago