Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.
☆41Dec 12, 2023Updated 2 years ago
Alternatives and similar repositories for WhoAmISlack
Users that are interested in WhoAmISlack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- ☆116Feb 11, 2026Updated 2 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 months ago
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆24Apr 27, 2026Updated last week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Apr 27, 2026Updated last week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 4 months ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 11 months ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Nuclei templates for honeypots detection.☆197Nov 7, 2023Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆122Apr 25, 2026Updated last week
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Oct 13, 2022Updated 3 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- ☆17May 16, 2022Updated 3 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- PII detection platform, leveraging human-in-the-loop AI☆53Nov 29, 2024Updated last year
- Artifact monitoring that ensures fairplay☆77Jan 29, 2025Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Security Alert Decoration☆27Jul 21, 2025Updated 9 months ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated last year
- ☆24Mar 4, 2025Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆112Jan 4, 2024Updated 2 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆16Nov 15, 2022Updated 3 years ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆26Jan 13, 2025Updated last year
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- A lightweight GPT model, trained to discover subdomains.☆363Dec 18, 2025Updated 4 months ago
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 4 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆52Dec 31, 2024Updated last year