Showing 26 open source projects for "thc-scan"

View related business solutions
  • Precoro helps companies spend smarter Icon
    Precoro helps companies spend smarter

    Fully Automated Process in One Tool: From Purchase Orders to Budget Control and Reporting.

    For minor company expenses, you might utilize a spend management solution or track everything in spreadsheets. For everything more, you'll need Precoro. We help companies achieve procurement excellence and budget efficiency by building transparent, predictable, automated spending workflows.
  • Powering the next decade of business messaging | Twilio MessagingX Icon
    Powering the next decade of business messaging | Twilio MessagingX

    For organizations interested programmable APIs built on a scalable business messaging platform

    Build unique experiences across SMS, MMS, Facebook Messenger, and WhatsApp – with our unified messaging APIs.
  • 1
    MOSINT

    MOSINT

    An automated e-mail OSINT tool

    MOSINT is the fastest OSINT Tool for emails. It helps you gather information about the target email. Email validation, check social accounts, check data breaches and password leaks, finding related emails and domains, scan Pastebin Dumps. Google Search and DNS Lookup.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 2
    Gitleaks

    Gitleaks

    Protect and discover secrets using Gitleaks

    Gitleaks is a fast, lightweight, portable, and open-source secret scanner for git repositories, files, and directories. With over 6.8 million docker downloads, 11.2k GitHub stars, 1.7 million GitHub Downloads, thousands of weekly clones, and over 400k homebrew installs, gitleaks is the most trusted secret scanner among security professionals, enterprises, and developers. Gitleaks-Action is our official GitHub Action. You can use it to automatically run a gitleaks scan on all your team's pull...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 3
    Terrascan

    Terrascan

    Detect compliance and security violations across Infrastructure

    Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure. As you embrace Infrastructure as Code (IaC) such as Terraform, Kubernetes, Argo CD, Atlantis and AWS CloudFormation, it is important to ensure that security best practices and compliance requirements are observed. Terracan provides 500+ out-of-the-box policies so that you can scan IaC against common policy standards such as the CIS Benchmark. It leverages...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4
    grype

    grype

    A vulnerability scanner for container images and filesystems

    A vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Works with Syft, the powerful SBOM (software bill of materials) tool for container images and filesystems. Scan the contents of a container image or filesystem to find known vulnerabilities. Find vulnerabilities for major operating system packages. Find vulnerabilities for language-specific packages. You can also choose another destination directory and release version for the installation...
    Downloads: 8 This Week
    Last Update:
    See Project
  • A CRM and Sales Data Management Platform for Multi-Line Sales Teams Icon
    A CRM and Sales Data Management Platform for Multi-Line Sales Teams

    The CRM, sales reporting, and commission tracking tool uniquely tailored to the needs of manufacturers, sales reps, and distributors.

    Repfabric is a customer relationship management (CRM) software designed specifically for multi-line sales teams (i.e. reps, distributors, wholesalers, dealers, and manufacturers). It streamlines and simplifies the sales process by providing deep integration with email, contacts, calendars, and deal tracking. The platform enables users to track commissions from CRM to sale, make updates directly from mobile devices, and document sales calls using voice-to-text features.
  • 5
    Vuls

    Vuls

    Agentless vulnerability scanner for Linux/FreeBSD

    Vuls is open-source, agent-less vulnerability scanner based on information from NVD, OVAL, etc. Vuls uses multiple vulnerability databases NVD, JVN, OVAL, RHSA/ALAS/ELSA/FreeBSD-SA and Changelog. Vuls v0.5.0 now possible to detect vulnerabilities that patches have not been published from distributors. Remote scan mode is required to only setup one machine that is connected to other scan target servers via SSH. If you don't want the central Vuls server to connect to each server by SSH, you can...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    gowitness

    gowitness

    Golang, web screenshot utility using Chrome Headless

    A golang, web screenshot utility using Chrome Headless. gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using the command line, with a handy report viewer to process results. Both Linux and macOS is supported, with Windows support mostly working. Inspiration for gowitness comes from Eyewitness. If you are looking for something with lots of extra features, be sure to check it out along with these other projects....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Redix

    Redix

    A very simple pure key => value storage system that speaks Redis

    ... will find a new way to do the same job but more easier and flexable, i.e, the well-known hset key field value command could be replaced with set key/field value, but sometimes you need to return a specific hashmap as key => value, but you run hget key field to get the key’s value and also it could be replaced with get key/field, but how could we replace hgetall key? I will say “it is easy”, let’s make the hget command work as a prefix scanner that scan the whole database.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 8
    Osmedeus Core Engine

    Osmedeus Core Engine

    A Workflow Engine for Offensive Security

    Osmedeus is a Workflow Engine for Offensive Security that allows you to build and run a reconnaissance system on a wide range of targets, including domains, URLs, CIDRs, and GitHub repositories. It was designed to establish a strong foundation and has the ability to adapt and function automatically in order to perform reconnaissance tasks. Designed to build a foundation with the capability and flexibility that allow you to run your reconnaissance system automatically. Osmedeus is a Workflow...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Coca

    Coca

    Coca is a toolbox which is design for legacy system refactoring

    Coca is a toolbox that is design for legacy system refactoring and analysis, including call graph, concept analysis, api tree, and design patterns suggestions. Requirements: graphviz for dot file to image (such as svg, png). The easiest way to get coca is to use one of the pre-built release binaries which are available for OSX, Linux, and Windows on the release page.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Vivantio IT Service Management Icon
    Vivantio IT Service Management

    Your service operation isn’t one-size-fits all, so your IT service management solution shouldn’t be either

    The Vivantio Platform allows you to focus on the IT service management tools that make sense for your organization’s unique service model: from incident, problem and change requests, to service requests, client knowledge and asset management
  • 10
    SecretScanner

    SecretScanner

    Find secrets and passwords in container images and file systems

    Deepfence SecretScanner can find unprotected secrets in container images or file systems. Secrets are any kind of sensitive or private data that gives authorized users permission to access critical IT infrastructure (such as accounts, devices, networks, cloud based services), applications, storage, databases, and other kinds of critical data for an organization. For example, passwords, AWS access IDs, AWS secret access keys, Google OAuth Key etc. are secrets. Secrets should be strictly kept...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Kubescape

    Kubescape

    Kubescape is an open-source Kubernetes security platform for your IDE

    ... an in-depth view of what is going on in the cluster. Kubescape includes misconfiguration and vulnerability scanning as well as risk analysis and security compliance indicators. All results are presented in context and users get many cues on what to do based on scan results. Targeted at the DevSecOps practitioner or platform engineer, it offers an easy-to-use CLI interface, flexible output formats, and automated scanning capabilities.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    crawley

    crawley

    The unix-way web crawler

    Crawls web pages and prints any link it can find. Fast HTML SAX-parser (powered by golang.org/x/net/html) Small (below 1500 SLOC), idiomatic, 100% test-covered codebase. Grabs most of useful resources URLs (pics, videos, audios, forms, etc...) Found URLs are streamed to stdout and guaranteed to be unique (with fragments omitted) Scan depth (limited by starting host and path, by default - 0) can be configured. Can crawl rules and sitemaps from robots.txt. Brute mode - scan HTML comments for URLs...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    KubeClarity

    KubeClarity

    KubeClarity is a tool for detection and management of vulnerabilities

    ..., and scan it for vulnerabilities. The results can be exported to KubeClarity backend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    openwechat

    openwechat

    golang WeChat SDK

    Golang version of personal micro-signal API, breaking through login restrictions, similar to developing public accounts, developing personal micro-signals. WeChat robot, using WeChat to complete the customized development of some functions. Modules are easy to use and easy to expand. Support customized development, such as logging, and automatic reply. Breakthrough login restrictions. No need to scan the QR code repeatedly to log in. Support multiple WeChat accounts to log in at the same time...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Trivy Operator

    Trivy Operator

    Kubernetes-native security toolkit

    The Trivy Operator leverages Trivy to continuously scan your Kubernetes cluster for security issues. The scans are summarised in security reports as Kubernetes Custom Resource Definitions, which become accessible through the Kubernetes API. The Operator does this by watching Kubernetes for state changes and automatically triggering security scans in response. For example, a vulnerability scan is initiated when a new Pod is created. This way, users can find and view the risks that relate...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    audit2rbac

    audit2rbac

    Autogenerate RBAC policies based on Kubernetes audit logs

    audit2rbac takes a Kubernetes audit log and username as input, and generates RBAC role and binding objects that cover all the API requests made by that user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Dockle

    Dockle

    Container Image Linter for Security

    Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start. You can install dockle with the asdf version manager with this plugin, which automates the process of installing (and switching between) various versions of github release binaries. With asdf already installed, run commands to install dockle. You can scan your built image with Dockle in Travis CI/CircleCI. Though, you can ignore the specified target checkpoints by using .dockleignore file...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    pq

    pq

    Pure Go Postgres driver for database/sql

    In most cases clients will use the database/sql package instead of using this package directly. Similarly to libpq, when establishing a connection using pq you are expected to supply a connection string containing zero or more parameters. A subset of the connection parameters supported by libpq are also supported by pq. Additionally, pq also lets you specify run-time parameters (such as search_path or work_mem) directly in the connection string. This is different from libpq, which does not...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    immortal

    immortal

    A *nix cross-platform (OS agnostic) supervisor

    A *nix cross-platform (OS agnostic) supervisor. The main idea behind immortal is to keep up and running services forever even if the server is rebooted the service should be started and based on the requirements probably the services may start in sequence by waiting for others to start, wait some seconds before starting, etc, but at the end the idea remains, “run something forever” and in case exist just restart it. Doing this could be tricky, mainly because if you just want to launch your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Miniflux 2

    Miniflux 2

    Minimalist and opinionated feed reader

    Miniflux is a minimalist and opinionated feed reader. The page layout, fonts, and colors are chosen to be readable on a screen. The most important thing is the content. Do you have feeds that display only a summary? Fetch the original article automatically. I suppose you don't like bloated software? Miniflux focuses on simplicity. Less is more! Be productive, use the keyboard shortcuts to navigate through the application. Scan quickly your unread items with the lightweight user interface...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    datree

    datree

    Prevent Kubernetes misconfigurations from reaching production

    Prevent Kubernetes misconfigurations from reaching production (again)! The CLI integration provides a policy enforcement solution to run automatic checks for rule violations. Datree is a CLI tool that supports Kubernetes admins in their roles by preventing developers from making errors in Kubernetes configurations that can cause clusters to fail in production. Our CLI tool is open source, enabling it to be supported by the Kubernetes community. It’s far more effective than manual processes,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Gobot

    Gobot

    Golang framework for robotics, drones, and the Internet of Things

    Gobot makes controlling robots and devices incredibly simple and fun. This program connects to an Arduino, and toggles an LED, every one second. Support for devices that use Analog Input/Output (AIO) communication have a shared set of drivers provided using the "gobot/drivers/aio" package. Support for devices that use General Purpose Input/Output (GPIO) communication have a shared set of drivers provided using the "gobot/drivers/gpio" package. Gobot has a extensible system for connecting to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl. While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    subjack

    subjack

    Subdomain Takeover tool written in Go

    Subjack is a Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones that are able to be hijacked. With Go's speed and efficiency, this tool really stands out when it comes to mass testing. Always double-check the results manually to rule out false positives. Subjack will also check for subdomains attached to domains that don't exist (NXDOMAIN) and are available to be registered. No need for dig ever again! This is still cross-compatible too...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    FIND

    FIND

    High-precision indoor positioning framework for most wifi devices

    Automate turning on lights with FIND by tracking the position of your phone indoorswith the FIND app. Track the location your laptop or embedded device in a small space using the FIND API. Monitor the location of many devices in a vicinity simultaneously using passive scanning. FIND attempts to simplify internal positioning. Internal positioning, simplified Using FIND, and only your smartphone or laptop, you will be able to pinpoint your position in your home or office. Unlike GPS on your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next