tomnomnom / symwatchLinks
A tool to run a command when the target of a symlink changes
☆16Updated 9 years ago
Alternatives and similar repositories for symwatch
Users that are interested in symwatch are comparing it to the libraries listed below
Sorting:
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Scans packages in npm and pypi for secrets☆31Updated 5 years ago
- NMAP NSE that enumerates VNC authentication types☆17Updated 14 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- A rogue DNS detector☆23Updated last month
- Clickjacking PoC Generator☆35Updated 4 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- apbleed☆24Updated 11 years ago
- DPE - Default Password Enumeration☆35Updated 12 years ago
- A tool for enumerating expired domains in CNAME records☆59Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆15Updated 9 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- Learn the basics of cryptography throughout history.☆20Updated 4 years ago
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Updated 5 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- ☆22Updated 4 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- A tiny set of helper scripts for ipinfo☆17Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A regular expression fuzzer.☆45Updated 7 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago