trufflesecurity / TruffleHog-Enterprise-Github-ActionLinks
Find exposed credentials using GitHub Actions with TruffleHog Enterprise.
☆16Updated 7 months ago
Alternatives and similar repositories for TruffleHog-Enterprise-Github-Action
Users that are interested in TruffleHog-Enterprise-Github-Action are comparing it to the libraries listed below
Sorting:
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Python module to ease writing scripts go over big amount of data in order to perform the same actions. A simple preconfigured threads and…☆12Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆14Updated 10 months ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- New version of the buildkit repository☆9Updated 3 years ago
- Golang installer for DefectDojo☆28Updated 5 months ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last week
- Documentation of vmc☆16Updated 4 months ago
- ☆11Updated 8 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Application scanning component of OWASP PurpleTeam☆15Updated 2 years ago
- Falcon Integration Gateway (FIG)☆19Updated 2 months ago
- Forensics Science Education☆11Updated 4 years ago
- ☆21Updated 2 years ago
- Source code for the Binaries of OWASP WrongSecrets☆11Updated this week
- A repo containing simple programs to ease pentester with generated commands to avoid syntax issues☆13Updated 5 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆34Updated 6 years ago
- recon-ng modules for Censys☆37Updated last year
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆28Updated this week
- A meta-database collecting resources that compile lists of breaches☆21Updated 8 months ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated last year
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year