tech-mojo / log-enhancerLinks
Extends and enhances console.log with various symbols and themes
☆10Updated 2 years ago
Alternatives and similar repositories for log-enhancer
Users that are interested in log-enhancer are comparing it to the libraries listed below
Sorting:
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆12,464Updated this week
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,398Updated last month
- Multi-Cloud Security Auditing Tool☆7,477Updated 2 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,998Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,323Updated 2 months ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,430Updated this week
- Cloud Security Posture Management (CSPM)☆3,654Updated 2 weeks ago
- Chico State's usr0 Security Club☆21Updated 2 years ago
- A GPT-empowered penetration testing tool☆9,459Updated this week
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆6,242Updated last year
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆4,681Updated last week
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,356Updated 2 months ago
- Retrieves findings with APPROVED mitigations from an application's policy scan (or sandbox) and creates a baseline file for Pipeline Scan…☆10Updated last year
- ☆32Updated last month
- Open-Source Phishing Toolkit☆13,391Updated last year
- Welcome cyberpsycho, SANDEVISTAN is your ultimate hub a single space where every reconnaissance, exploitation, and post-exploitation tool…☆98Updated last month
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆30,465Updated last week
- A Hijacker that is able to take all Cookies from A Mozilla Webbrowser and than sends it to the responding Server.☆14Updated 2 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆12,143Updated last week
- Automating situational awareness for cloud penetration tests.☆2,257Updated this week
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,171Updated last year
- Attack Surface Management Platform☆9,271Updated 2 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,949Updated 7 months ago
- Find, verify, and analyze leaked credentials☆23,810Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆67,653Updated this week
- An authoritative list of awesome devsecops tools with the help from community experiments and contributions.☆5,205Updated last year
- Ultimate DevSecOps library☆6,506Updated 5 months ago
- Raccolta di flags e writeup delle challenge presenti su https://training.olicyber.it/challenges☆17Updated 2 years ago
- Find secrets with Gitleaks 🔑☆24,308Updated last week
- The ZAP by Checkmarx Core project☆14,523Updated last week