vietjovi / secret-detectionView external linksLinks
Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files
☆17Jan 26, 2026Updated 3 weeks ago
Alternatives and similar repositories for secret-detection
Users that are interested in secret-detection are comparing it to the libraries listed below
Sorting:
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆41May 3, 2021Updated 4 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- Addon features for Xperia X8/X10mini/X10minipro☆17Jan 31, 2013Updated 13 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- Simulates Attacks of AB16 on Argon2i☆11Aug 4, 2016Updated 9 years ago
- A public repo to hold some code review challenges for RSA Conference 2022☆11Jun 3, 2022Updated 3 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- Brief tutorial how to install linux on Asus T100HA☆13May 2, 2017Updated 8 years ago
- FiSDK is an API toolkit developed by Fintechee for managing and controlling the backend of the Fintechee trading platform.☆30Jan 2, 2026Updated last month
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆23Jan 17, 2026Updated last month
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- Pipe data between Kafka topics with ease and choose what to do for individual records☆12May 2, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- A moment-free estimator of the Sharpe (signal-to-noise) ratio.☆12Dec 27, 2022Updated 3 years ago
- Failover scripts for MooseFS☆17Mar 21, 2011Updated 14 years ago
- ☆10Mar 31, 2021Updated 4 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- ☆11Feb 22, 2022Updated 3 years ago
- ☆10Feb 8, 2021Updated 5 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆14Jul 19, 2025Updated 6 months ago
- All my POC related to malware development☆14May 13, 2024Updated last year
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 5 years ago
- ☆11Mar 14, 2023Updated 2 years ago
- Jupyter notebooks and python scripts for teaching economics. Interactive at:☆14Jan 23, 2026Updated 3 weeks ago
- AmIUnique extension for Chrome☆10Apr 3, 2019Updated 6 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- A light weight x86 32bit kernel☆24Dec 5, 2025Updated 2 months ago
- Splunk Remote Work Insights - Executive Dashboard☆43Aug 20, 2020Updated 5 years ago
- Splunk app for visualization of DMARC RUA mails☆15Sep 26, 2025Updated 4 months ago
- my n00b notes on web_study☆16May 29, 2025Updated 8 months ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated 10 months ago
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- html5 framework for TV app☆17Dec 9, 2013Updated 12 years ago