trickest / insiders
Archive of Potential Insider Threats
☆145Updated last year
Alternatives and similar repositories for insiders:
Users that are interested in insiders are comparing it to the libraries listed below
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆127Updated 10 months ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆175Updated 3 months ago
- Filter and enrich a list of subdomains by level☆204Updated last year
- Sample Obsidian's vault for web pentesting☆97Updated 8 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆236Updated last year
- Monitoring the Cloud Landscape☆80Updated this week
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated 2 years ago
- Execute Trickest workflows right from your terminal☆91Updated last week
- List all public repositories for (valid) GitHub usernames☆73Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆183Updated 2 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆179Updated last year
- Striping CDN IPs from a list of IP Addresses☆77Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆71Updated last year
- Opensource assets and vulnerability scanning tool☆163Updated 3 months ago
- Simple bash Oneliners to make life easier☆62Updated 4 years ago
- Distribute ordinary bash commands over many systems☆164Updated 2 years ago
- Target practice for ffuf☆63Updated 3 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆122Updated 2 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆127Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- ☆68Updated last year
- Prototype pollution scanner using headless chrome☆218Updated 2 years ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆105Updated 3 years ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆210Updated this week
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆110Updated 3 years ago
- goverview - Get an overview of the list of URLs☆143Updated last year
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆127Updated 3 years ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆139Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated last year
- Real world bug bounty wordlists☆112Updated last year