trickest / insidersLinks
Archive of Potential Insider Threats
☆153Updated 2 years ago
Alternatives and similar repositories for insiders
Users that are interested in insiders are comparing it to the libraries listed below
Sorting:
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆179Updated 3 weeks ago
- Monitoring the Cloud Landscape☆92Updated last week
- Execute Trickest workflows right from your terminal☆95Updated 2 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆129Updated 3 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆116Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆132Updated 3 years ago
- security.txt collection of most popular world-wide domains☆55Updated 2 years ago
- Filter and enrich a list of subdomains by level☆210Updated 2 years ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆230Updated last week
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated 2 years ago
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆130Updated last year
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆196Updated this week
- Opensource assets and vulnerability scanning tool☆186Updated 3 weeks ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- ☆59Updated 3 years ago
- Distribute ordinary bash commands over many systems☆168Updated 3 years ago
- Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation☆92Updated 2 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆203Updated 2 weeks ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- Sample Obsidian's vault for web pentesting☆104Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆190Updated 3 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆181Updated last month
- ☆67Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated 2 years ago
- Target practice for ffuf☆70Updated 4 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆76Updated 2 weeks ago
- Striping CDN & WAF IPs from a list of IP Addresses☆81Updated 9 months ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆25Updated 2 years ago
- Find related domains of a given domain.☆103Updated 2 years ago