tech-mojo / log-enhancer
Extends and enhances console.log with various symbols and themes
☆10Updated 2 years ago
Alternatives and similar repositories for log-enhancer:
Users that are interested in log-enhancer are comparing it to the libraries listed below
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,178Updated 2 weeks ago
- Prowler is an Open Cloud Security tool for AWS, Azure, GCP and Kubernetes. It helps for continuos monitoring, security assessments and au…☆11,499Updated this week
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,644Updated last month
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,152Updated 5 months ago
- Multi-Cloud Security Auditing Tool☆7,084Updated 5 months ago
- Cloud Security Posture Management (CSPM)☆3,495Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12,875Updated 3 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,989Updated this week
- Open Cyber Threat Intelligence Platform☆7,191Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,833Updated 2 months ago
- A curated list of tools for incident response☆8,073Updated 9 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,778Updated last month
- ☆16Updated 7 months ago
- Automating situational awareness for cloud penetration tests.☆2,081Updated last month
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆4,625Updated 9 months ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,115Updated 2 months ago
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,619Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆64,845Updated last week
- ☆12Updated last year
- CVE cache of the official CVE List in CVE JSON 5 format☆1,871Updated this week
- Pentesting Fundamentals for Beginners, by EC-Council☆11Updated 2 years ago
- About Bishworaj Poudel☆36Updated 4 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,732Updated 9 months ago
- List of Awesome Red Teaming Resources☆7,163Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,612Updated 5 months ago
- ☆33Updated 9 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,447Updated 2 months ago
- This webpage blocks VPN users from Accessing the Webpage.☆2Updated last year
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,408Updated 5 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,100Updated this week