tech-mojo / log-enhancer
Extends and enhances console.log with various symbols and themes
☆10Updated 2 years ago
Alternatives and similar repositories for log-enhancer
Users that are interested in log-enhancer are comparing it to the libraries listed below
Sorting:
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,207Updated 2 weeks ago
- Prowler is an Open Cloud Security Platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuos monitoring, security as…☆11,596Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12,990Updated 3 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,691Updated last month
- Multi-Cloud Security Auditing Tool☆7,138Updated 5 months ago
- Cloud Security Posture Management (CSPM)☆3,516Updated 2 weeks ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,177Updated 6 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,847Updated 3 months ago
- List of Awesome Asset Discovery Resources☆2,126Updated 3 months ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,085Updated last week
- Find, verify, and analyze leaked credentials☆19,100Updated this week
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,766Updated last week
- An authoritative list of awesome devsecops tools with the help from community experiments and contributions.☆4,879Updated last year
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆6,364Updated 11 months ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,377Updated this week
- Automating situational awareness for cloud penetration tests.☆2,104Updated 2 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,670Updated 3 weeks ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,832Updated 7 months ago
- ☆11Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆5,492Updated 9 months ago
- In-depth attack surface mapping and asset discovery☆12,980Updated this week
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,158Updated 3 months ago
- Find leaked secrets via github search☆2,942Updated 3 months ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,147Updated last month
- Granular, Actionable Adversary Emulation for the Cloud☆2,016Updated last week
- A curated list of amazingly awesome OSINT☆21,310Updated this week
- Node.js bindings for the reference implementation of the Classic McEliece KEM.☆12Updated 6 months ago
- The Bug Hunters Methodology☆4,059Updated last year
- Fast subdomains enumeration tool for penetration testers☆10,338Updated 9 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,175Updated 6 months ago