trufflesecurity / TruffleHog-Enterprise-Github-ActionLinks
Find exposed credentials using GitHub Actions with TruffleHog Enterprise.
☆16Updated 8 months ago
Alternatives and similar repositories for TruffleHog-Enterprise-Github-Action
Users that are interested in TruffleHog-Enterprise-Github-Action are comparing it to the libraries listed below
Sorting:
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated 2 years ago
- Falcon Integration Gateway (FIG)☆19Updated 3 months ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆14Updated 10 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Updated last month
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆30Updated 11 months ago
- multiple password 'asher using Python’s hashlib☆15Updated 4 years ago
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 5 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆15Updated last year
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated 2 weeks ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Updated 8 years ago
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆7Updated 2 years ago
- Legba recipes.☆50Updated 11 months ago
- Training for Golang (go language)☆10Updated 6 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- Miscellaneous tools for BloodHound☆17Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- A command based package for simple display of statistics☆23Updated 8 months ago