Archive of Potential Insider Threats
☆153Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for insiders
Users that are interested in insiders are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Filter and enrich a list of subdomains by level☆213Sep 25, 2023Updated 2 years ago
- Combine words from two wordlist files and concatenate them with an optional delimiter☆39Sep 25, 2023Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆77Sep 25, 2023Updated 2 years ago
- security.txt collection of most popular world-wide domains☆56Sep 25, 2023Updated 2 years ago
- Monitoring the Cloud Landscape☆93Apr 23, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Feb 16, 2022Updated 4 years ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆275Sep 25, 2023Updated 2 years ago
- Find CVE PoCs on GitHub☆161Aug 1, 2025Updated 9 months ago
- Make URL path combinations using a wordlist☆173Sep 25, 2023Updated 2 years ago
- Asset inventory of over 800 public bug bounty programs.☆1,541Feb 14, 2025Updated last year
- The most exhaustive list of reliable DNS resolvers.☆982Apr 24, 2026Updated last week
- Tool to extract & validate google fcm server keys from apks☆29Jan 20, 2021Updated 5 years ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- Handy scripts and one-liners to make life easier☆38Mar 6, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆20Jan 12, 2022Updated 4 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Automated privilege escalation of the world's most popular Docker images.☆70Sep 25, 2023Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,742Apr 26, 2026Updated last week
- ☆34Jun 23, 2021Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Apr 20, 2026Updated last week
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆69Sep 25, 2023Updated 2 years ago
- Manage attack surface data on Elasticsearch☆26Nov 20, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆330Jul 11, 2025Updated 9 months ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- Find endpoints on GitHub.☆220Mar 28, 2023Updated 3 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Sep 25, 2023Updated 2 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆85Jan 12, 2026Updated 3 months ago
- A collection of impressive and useful results from OpenAI's chatgpt☆74Dec 2, 2022Updated 3 years ago
- DNS resolution tracing tool☆35Jun 29, 2021Updated 4 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Distribute ordinary bash commands over many systems☆167Aug 29, 2022Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- You can find hardcoded Api-Key,Secret,Token Etc..☆77Sep 3, 2022Updated 3 years ago
- Resolvers updated daily for reconftw☆49Feb 7, 2023Updated 3 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆515Jul 17, 2022Updated 3 years ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,042Aug 23, 2025Updated 8 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago