tech-mojo / log-enhancerLinks
Extends and enhances console.log with various symbols and themes
☆10Updated 2 years ago
Alternatives and similar repositories for log-enhancer
Users that are interested in log-enhancer are comparing it to the libraries listed below
Sorting:
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆12,929Updated this week
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,464Updated 2 weeks ago
- Multi-Cloud Security Auditing Tool☆7,532Updated 4 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,057Updated 3 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,563Updated 4 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,399Updated 3 months ago
- Cloud Security Posture Management (CSPM)☆3,694Updated 2 months ago
- ☆28,198Updated 3 weeks ago
- Find, verify, and analyze leaked credentials☆24,338Updated last week
- Open-Source Unified Vulnerability Management, DevSecOps & ASPM☆4,477Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,215Updated last week
- Repository used for Mobile Development Course☆12Updated 7 years ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,500Updated this week
- Discord bot improving social network message embedding.☆16Updated last year
- Fast passive subdomain enumeration tool.☆12,991Updated this week
- Production-ready platform for agentic workflow development.☆128,415Updated last week
- A collection of various awesome lists for hackers, pentesters and security researchers☆106,177Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,554Updated 2 weeks ago
- Open Source Vulnerability Management Platform☆6,236Updated last week
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,991Updated last month
- Automated Adversary Emulation Platform☆6,717Updated this week
- Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS F…☆1,192Updated last year
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Updated 6 years ago
- A collection of AWS penetration testing junk☆1,216Updated 2 years ago
- Application Security Verification Standard☆3,326Updated last week
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,799Updated last year
- Adversary Emulation Framework☆10,635Updated this week
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,572Updated 9 months ago
- Main Sigma Rule Repository☆10,088Updated this week
- A Python based Nessus GUI Parser that parses .nessus files and generates two structured HTML Reports - VA Table and Detailed Findings.☆16Updated 9 months ago