trickest / insidersLinks
Archive of Potential Insider Threats
☆149Updated last year
Alternatives and similar repositories for insiders
Users that are interested in insiders are comparing it to the libraries listed below
Sorting:
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆177Updated 8 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 3 years ago
- Monitoring the Cloud Landscape☆87Updated last week
- Execute Trickest workflows right from your terminal☆94Updated 3 weeks ago
- List all public repositories for (valid) GitHub usernames☆76Updated last year
- Filter and enrich a list of subdomains by level☆211Updated last year
- 🔭 Collection of regexp pattern for security passive scanning☆115Updated 2 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆131Updated 3 years ago
- security.txt collection of most popular world-wide domains☆54Updated last year
- Target practice for ffuf☆67Updated 4 years ago
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆128Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Updated last year
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year
- Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation☆89Updated 2 years ago
- Distribute ordinary bash commands over many systems☆168Updated 3 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆197Updated last month
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆188Updated 3 years ago
- ☆56Updated 2 years ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆220Updated last week
- Sample Obsidian's vault for web pentesting☆100Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆174Updated this week
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆60Updated 2 years ago
- 🏴☠️ Find dead-links (broken links)☆151Updated this week
- Get related domains / subdomains by looking at Google Analytics IDs☆250Updated 3 years ago
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆183Updated this week
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated 4 months ago
- Opensource assets and vulnerability scanning tool☆184Updated 3 months ago
- DNS resolution tracing tool☆34Updated 4 years ago
- Chrome and Firefox extension that lists Amazon S3 Buckets while browsing☆124Updated last month