trickest / insidersLinks
Archive of Potential Insider Threats
☆153Updated 2 years ago
Alternatives and similar repositories for insiders
Users that are interested in insiders are comparing it to the libraries listed below
Sorting:
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆129Updated 3 years ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆179Updated 2 weeks ago
- Execute Trickest workflows right from your terminal☆95Updated 2 months ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- Monitoring the Cloud Landscape☆91Updated last week
- 🔭 Collection of regexp pattern for security passive scanning☆115Updated 2 years ago
- Target practice for ffuf☆69Updated 4 years ago
- ☆58Updated 3 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆201Updated this week
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆190Updated 3 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆132Updated 3 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆76Updated this week
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- Get related domains / subdomains by looking at Google Analytics IDs☆250Updated 3 years ago
- Distribute ordinary bash commands over many systems☆168Updated 3 years ago
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆130Updated last year
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆194Updated this week
- Filter and enrich a list of subdomains by level☆210Updated 2 years ago
- Sample Obsidian's vault for web pentesting☆102Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated 2 years ago
- Opensource assets and vulnerability scanning tool☆186Updated last week
- Chrome and Firefox extension that lists Amazon S3 Buckets while browsing☆129Updated 5 months ago
- ☆67Updated 2 years ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆229Updated 2 weeks ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated 2 years ago
- ☆58Updated last year
- ☆73Updated 4 years ago
- goverview - Get an overview of the list of URLs☆142Updated last month