trufflesecurity / TruffleHog-Enterprise-Github-ActionLinks
Find exposed credentials using GitHub Actions with TruffleHog Enterprise.
☆16Updated last year
Alternatives and similar repositories for TruffleHog-Enterprise-Github-Action
Users that are interested in TruffleHog-Enterprise-Github-Action are comparing it to the libraries listed below
Sorting:
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Example packet.proxy plugins.☆22Updated 5 years ago
- A tool to run nmap against each line in a script.☆17Updated 5 years ago
- ☆21Updated last week
- Falcon Integration Gateway (FIG)☆21Updated last week
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆17Updated last year
- A command based package for simple display of statistics☆25Updated last year
- Golang installer for DefectDojo☆29Updated 11 months ago
- multiple password 'asher using Python’s hashlib☆15Updated 4 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 7 months ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated 2 years ago
- A webpage monitor bot, currently used to monitor Twitter ToS.☆19Updated 3 years ago
- Web application pentesting recon☆23Updated 5 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 3 years ago
- Training scenarios for cyber ranges☆13Updated 5 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Updated last month
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated 2 years ago
- Just a bunch of useful scripts for netsec/admin/others☆14Updated last month
- ☆12Updated 8 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Updated 5 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- 🐺 Command-line application and golang client library for hunter.io☆39Updated last year
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Updated last year
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- The OWASP Amass Homebrew Formula☆16Updated 5 months ago