trufflesecurity / TruffleHog-Enterprise-Github-ActionLinks
Find exposed credentials using GitHub Actions with TruffleHog Enterprise.
☆16Updated last year
Alternatives and similar repositories for TruffleHog-Enterprise-Github-Action
Users that are interested in TruffleHog-Enterprise-Github-Action are comparing it to the libraries listed below
Sorting:
- Example packet.proxy plugins.☆22Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Falcon Integration Gateway (FIG)☆21Updated 2 weeks ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Forensics Science Education☆11Updated 4 years ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆15Updated last year
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated 2 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated 3 weeks ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Sniffs sensitive data from interface or pcap☆14Updated 7 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 5 months ago
- ☆11Updated 8 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆90Updated 3 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 3 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Updated 9 years ago
- Session scripts.☆49Updated 3 years ago
- The hacker technical cheat sheet☆43Updated 4 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated this week
- https://bc-security.gitbook.io/empire-wiki/☆12Updated 2 years ago
- ☆17Updated 4 years ago
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 5 years ago
- Free tools for mobile testing.☆37Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Training scenarios for cyber ranges☆12Updated 5 years ago