tech-mojo / log-enhancerLinks
Extends and enhances console.log with various symbols and themes
☆10Updated 2 years ago
Alternatives and similar repositories for log-enhancer
Users that are interested in log-enhancer are comparing it to the libraries listed below
Sorting:
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆12,929Updated this week
- Multi-Cloud Security Auditing Tool☆7,532Updated 4 months ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,464Updated 2 weeks ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,057Updated 3 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,563Updated 4 months ago
- Cloud Security Posture Management (CSPM)☆3,694Updated 2 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,399Updated 3 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,539Updated last year
- A simple React project for a links page☆13Updated 7 months ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,178Updated this week
- Automating situational awareness for cloud penetration tests.☆2,290Updated last week
- Pentesting Fundamentals for Beginners, by EC-Council☆11Updated 3 years ago
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,033Updated last week
- Granular, Actionable Adversary Emulation for the Cloud☆2,235Updated last week
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,500Updated last week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,908Updated this week
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,503Updated last week
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,799Updated last year
- IAM Least Privilege Policy Generator☆2,134Updated last week
- Ultimate DevSecOps library☆6,573Updated 6 months ago
- Fast web fuzzer written in Go☆15,527Updated 9 months ago
- Open Source Vulnerability Management Platform☆6,236Updated 2 weeks ago
- E-mails, subdomains and names Harvester - OSINT☆15,560Updated last week
- Youtube downloader is built using python. This project downloads youtube video in the form of audio as well as video. On running the pyth…☆10Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,554Updated 3 weeks ago
- Automated Adversary Emulation Platform☆6,717Updated last week
- Find, verify, and analyze leaked credentials☆24,487Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,966Updated 8 months ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,397Updated 2 months ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,359Updated 2 months ago