trufflesecurity / WhoAmISlackView external linksLinks
Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.
☆42Dec 12, 2023Updated 2 years ago
Alternatives and similar repositories for WhoAmISlack
Users that are interested in WhoAmISlack are comparing it to the libraries listed below
Sorting:
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Jan 11, 2026Updated last month
- ☆115Aug 12, 2025Updated 6 months ago
- Saves pages to Wayback machine☆13Dec 2, 2024Updated last year
- Java archive implant toolkit.☆61Apr 20, 2025Updated 9 months ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- ☆18Jul 30, 2024Updated last year
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- ☆17May 16, 2022Updated 3 years ago
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆22Feb 6, 2026Updated last week
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆21Jan 13, 2025Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Oct 13, 2022Updated 3 years ago
- Nuclei templates for honeypots detection.☆198Nov 7, 2023Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 6 months ago
- Artifact monitoring that ensures fairplay☆79Jan 29, 2025Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated last month
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆114Feb 7, 2026Updated last week
- A lightweight GPT model, trained to discover subdomains.☆344Dec 18, 2025Updated last month
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Security Alert Decoration☆27Jul 21, 2025Updated 6 months ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated last month
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- find dangling domains in a multi cloud environment☆175Dec 25, 2025Updated last month
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆114Jan 4, 2024Updated 2 years ago
- Tool to fuzz for interesting vhost.☆23Jan 8, 2025Updated last year
- AWS honey token manager☆89Aug 1, 2024Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134May 7, 2025Updated 9 months ago
- ☆23Mar 4, 2025Updated 11 months ago
- ☆23Sep 12, 2024Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Dec 16, 2024Updated last year
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year