Name: Trickest | Offensive Security Automation
Type: Organization
Bio: Enabling large Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.
Twitter: trick3st
Blog: https://trickest.com
Trickest | Offensive Security Automation's Projects
Github Action for Trickest Workflows
Monitoring the Cloud Landscape
Automated privilege escalation of the world's most popular Docker images.
Gather and update all available and newest CVEs with their PoC.
Filter and enrich a list of subdomains by level
Manage attack surface data on Elasticsearch
List all public repositories for (valid) GitHub usernames
Find CVE PoCs on GitHub
Extracting OSINT Insights from 15TB of GitHub Event Logs
Archive of Potential Insider Threats
Asset inventory of over 800 public bug bounty programs.
Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
Combine words from two wordlist files and concatenate them with an optional delimiter
Make URL path combinations using a wordlist
Generate tens of thousands of subdomain combinations in a matter of seconds
Automated compromise detection of the world's most popular packages
Create your own recon & vulnerability scanner with Trickest and GitHub
The most exhaustive list of reliable DNS resolvers.
Parallel S3 and local filesystem execution tool.
security.txt collection of most popular world-wide domains
Handy scripts and one-liners to make life easier
Execute Trickest workflows right from your terminal
First-class support for Vault and Kubernetes.
Real-world infosec wordlists, updated regularly
Monitoring the internet for new .zip domains