Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.
☆122Mar 25, 2026Updated this week
Alternatives and similar repositories for heisenberg-ssc-health-check
Users that are interested in heisenberg-ssc-health-check are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Feb 2, 2026Updated last month
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated 11 months ago
- ☆14Jan 8, 2026Updated 2 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Continuous External Attack Surface Discovery & Vulnerability Scanning Across AWS Organizations — Python CDK☆13Mar 6, 2026Updated 3 weeks ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆116Feb 5, 2026Updated last month
- This repository is for the Testing ASP.NET ViewState with YSoNet (YSoSerial.NET) workshop.☆23Dec 17, 2025Updated 3 months ago
- A frightfully intelligent algorithmic trading automaton of noble birth. Sir Reginald's prime directive: to acquire undervalued assets pos…☆42Sep 18, 2025Updated 6 months ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated last month
- ☆11Feb 16, 2023Updated 3 years ago
- An open source, cloud-native security to protect everything from build to runtime☆405Updated this week
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- Collection of patches I apply to my personal GrapheneOS builds☆20Mar 6, 2026Updated 3 weeks ago
- Metis is an open-source, AI-driven tool for deep security code review☆493Updated this week
- ☆72Oct 24, 2025Updated 5 months ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated last month
- Data about all known supply-chain attacks through history☆64May 28, 2025Updated 10 months ago
- A collection of js analysis tools & scripts.☆19Mar 8, 2026Updated 3 weeks ago
- Curated Collection of Popular Community Rules for Semgrep☆18Dec 27, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- ☆46Nov 7, 2024Updated last year
- The WiFi IR Blaster is designed to connect all of your old, legacy IR-controlled devices to a WiFi network -- exposing them to a new meth…☆10Dec 6, 2018Updated 7 years ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆33Oct 3, 2025Updated 5 months ago
- Jailbreak detection bypass for the iOSSecuritySuite Swift library☆17Feb 18, 2024Updated 2 years ago
- A lightweight Snowflake emulator built with Go and DuckDB for local development and testing☆28Jan 19, 2026Updated 2 months ago
- ☆30Jan 13, 2026Updated 2 months ago
- ☆17Feb 3, 2026Updated last month
- Zero downtime restart and graceful shutdown in one line of code☆11Jul 24, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Extract GraphQL operations from javascript☆23Mar 18, 2026Updated last week
- Standalone, local-runnable binaries of popular linux distributions☆10Dec 15, 2021Updated 4 years ago
- Mujde☆25Apr 25, 2025Updated 11 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 10 months ago
- A web interface to create Google Classrooms in bulk from a CSV☆10Dec 24, 2020Updated 5 years ago
- Groundbreaking Open-Source Chemical Threat Detection System☆29Aug 22, 2025Updated 7 months ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago