trufflesecurity / TruffleHog-Enterprise-Github-ActionLinks
Find exposed credentials using GitHub Actions with TruffleHog Enterprise.
☆17Updated last year
Alternatives and similar repositories for TruffleHog-Enterprise-Github-Action
Users that are interested in TruffleHog-Enterprise-Github-Action are comparing it to the libraries listed below
Sorting:
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Example packet.proxy plugins.☆22Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- A tool to run nmap against each line in a script.☆17Updated 5 years ago
- Forensics Science Education☆11Updated 4 years ago
- Falcon Integration Gateway (FIG)☆21Updated last month
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- ☆12Updated 8 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- A webpage monitor bot, currently used to monitor Twitter ToS.☆19Updated 3 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Updated 9 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Updated 5 years ago
- Sniffs sensitive data from interface or pcap☆14Updated 7 years ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆17Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 4 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Updated 8 years ago
- Generates several passwords based on one single word, like a company's name.☆25Updated 4 years ago
- Free tools for mobile testing.☆39Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆47Updated 10 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆77Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Metasploit Framework☆29Updated 12 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Updated 9 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Updated 5 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Updated 3 years ago