tech-mojo / log-enhancer
Extends and enhances console.log with various symbols and themes
☆10Updated last year
Alternatives and similar repositories for log-enhancer:
Users that are interested in log-enhancer are comparing it to the libraries listed below
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,058Updated this week
- Prowler is an Open Cloud Security tool for AWS, Azure, GCP and Kubernetes. It helps for continuos monitoring, security assessments and au…☆11,134Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12,020Updated last week
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,053Updated 3 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,496Updated this week
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆1,796Updated 3 weeks ago
- ☆1Updated 3 years ago
- ☆18Updated 2 years ago
- ☆18Updated last year
- Multi-Cloud Security Auditing Tool☆6,894Updated 2 months ago
- Excellent GitHub Readme by @crazydevlegend☆13Updated 2 years ago
- ☆6Updated 3 years ago
- Cloud Security Posture Management (CSPM)☆3,413Updated this week
- ☆3Updated 3 years ago
- Colored symbols for various log levels☆750Updated 5 months ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,304Updated 3 months ago
- Config files for my GitHub profile.☆19Updated 2 years ago
- Open Cyber Threat Intelligence Platform☆6,748Updated this week
- A collection of scripts for assessing Microsoft Azure security☆2,091Updated 3 weeks ago
- ☆11Updated 2 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,569Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,782Updated 3 months ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆11,346Updated 3 months ago
- In-depth attack surface mapping and asset discovery☆12,376Updated last month
- Find, verify, and analyze leaked credentials☆17,870Updated this week
- ☆2,021Updated this week
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆4,502Updated 6 months ago
- ☆10Updated last year
- A GPT-empowered penetration testing tool☆7,671Updated 2 months ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆814Updated 3 months ago