trufflesecurity / TruffleHog-Enterprise-Github-Action
Find exposed credentials using GitHub Actions with TruffleHog Enterprise.
☆15Updated 4 months ago
Alternatives and similar repositories for TruffleHog-Enterprise-Github-Action:
Users that are interested in TruffleHog-Enterprise-Github-Action are comparing it to the libraries listed below
- Documentation of vmc☆14Updated 3 weeks ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- 🐺 Command-line application and golang client library for hunter.io☆38Updated 7 months ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆13Updated 6 months ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated last year
- Fast and passive subdomain enumeration.☆17Updated 2 years ago
- ☆11Updated 8 years ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 2 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated last week
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated last month
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your …☆16Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆38Updated last week
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- A Go scraper that validates security.txt files and outputs them in the disclose.io JSON format.☆20Updated 3 years ago
- Golang installer for DefectDojo☆27Updated 2 months ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated this week
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆28Updated last year
- Source code for the Binaries of OWASP WrongSecrets☆11Updated 2 weeks ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Falcon Integration Gateway (FIG)☆18Updated 3 weeks ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- OWASP Foundation Web Respository☆11Updated 6 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago