techjacker / repo-security-scanner
CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys
☆1,163Updated 2 years ago
Alternatives and similar repositories for repo-security-scanner:
Users that are interested in repo-security-scanner are comparing it to the libraries listed below
- Scan your code for security misconfiguration, search for passwords and secrets.☆645Updated last year
- A tool to capture all the git secrets by leveraging multiple open source git searching tools☆1,130Updated 5 years ago
- Git plugin that prevents sensitive data from being committed.☆312Updated 4 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,772Updated last month
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆640Updated 3 years ago
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆789Updated 3 years ago
- Gorsair gives root access on remote docker containers that expose their APIs☆850Updated last year
- A subdomain enumeration tool.☆896Updated 3 years ago
- Security auditing tool for AWS environments☆1,728Updated 6 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,857Updated 2 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,208Updated 6 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆680Updated 4 years ago
- A Tool for DNS Delegation Trust Graphing☆403Updated last year
- A collection of AWS penetration testing junk☆1,189Updated last year
- Docker security analysis & hacking tools☆1,371Updated 4 years ago
- goSDL☆525Updated 2 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆597Updated 3 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆517Updated 6 years ago
- Exploits written by the Rhino Security Labs team☆1,073Updated 4 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆909Updated 5 years ago
- Docker containers vulnerability scan☆855Updated 2 months ago
- Subdomain enumeration and information gathering tool☆1,275Updated last month
- Reconnaissance tool for GitHub organizations☆6,020Updated 2 years ago
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,970Updated 9 months ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆492Updated 4 months ago
- Application Security Automation☆529Updated last year
- A container analysis and exploitation tool for pentesters and engineers.☆665Updated last year
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,674Updated 7 months ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,400Updated last year
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆468Updated 2 years ago