tech-mojo / log-enhancerLinks
Extends and enhances console.log with various symbols and themes
☆10Updated 2 years ago
Alternatives and similar repositories for log-enhancer
Users that are interested in log-enhancer are comparing it to the libraries listed below
Sorting:
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,354Updated last month
- Prowler is the Open Cloud Security for AWS, Azure, GCP, Kubernetes, M365 and more. As agent-less, it helps for continuous monitoring, sec…☆12,208Updated this week
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,942Updated 2 months ago
- Multi-Cloud Security Auditing Tool☆7,387Updated 3 weeks ago
- Retrieves findings with APPROVED mitigations from an application's policy scan (or sandbox) and creates a baseline file for Pipeline Scan…☆10Updated last year
- Cloud Security Posture Management (CSPM)☆3,621Updated last week
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,223Updated last week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,937Updated 2 weeks ago
- ☆13Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,727Updated 4 months ago
- Adversary Emulation Framework☆10,105Updated last week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,926Updated 5 months ago
- Automating situational awareness for cloud penetration tests.☆2,219Updated this week
- Damn Vulnerable Web Application (DVWA)☆11,975Updated this week
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,753Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,035Updated 2 weeks ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,859Updated 2 weeks ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,160Updated 2 weeks ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,205Updated last month
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,336Updated 6 months ago
- ☆10Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,637Updated 2 years ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆25,103Updated this week
- Automated Adversary Emulation Platform☆6,480Updated this week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,043Updated this week
- Pentesting Fundamentals for Beginners, by EC-Council☆11Updated 2 years ago
- [Node, Python, Java] Repository of sample Custom Rules for AWS Config.☆1,714Updated 2 weeks ago
- Six Degrees of Domain Admin☆10,365Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,168Updated 2 weeks ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,101Updated this week