🔓 🔓 Find secrets and passwords in container images and file systems 🔓 🔓
-
Updated
May 6, 2024 - Go
🔓 🔓 Find secrets and passwords in container images and file systems 🔓 🔓
⭐ ⭐ Distributed tcpdump for cloud native environments ⭐ ⭐
The Network Execution Tool
⭐ ⭐ Use ML to classify flows and packets as benign or malicious. ⭐ ⭐
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike.
LLM vulnerability scanner
Metlo is an open-source API security platform.
Little Bug Bounty & Hacking Tools⚔️
Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.
BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-exposed storage buckets by scanning files that store data in plain-text.
Tools & Resources for Cyber Security Operations
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highlighting those that contain matches.
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
ServiceNow widge-simple-list misconfiguration scanner
Generate tens of thousands of subdomain combinations in a matter of seconds
Filter and enrich a list of subdomains by level
This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Add a description, image, and links to the infosectools topic page so that developers can more easily learn about it.
To associate your repository with the infosectools topic, visit your repo's landing page and select "manage topics."