The Security Dependency Orchestrator Service
☆87Dec 11, 2020Updated 5 years ago
Alternatives and similar repositories for deeptracy
Users that are interested in deeptracy are comparing it to the libraries listed below
Sorting:
- The clever vulnerability dependency finder☆96May 10, 2022Updated 3 years ago
- The scalable, auditable and high-performance tamper-evident log project☆102Feb 27, 2020Updated 6 years ago
- Improves Ubuntu security feed compatibility allowing it to be consumed by Debian vulnerability report tool, debsecan.☆12May 30, 2021Updated 4 years ago
- Find API keys in your code.☆40Aug 18, 2021Updated 4 years ago
- A library to access to basic functions of hardware cryptocurrencies wallets☆10Mar 17, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- AWS credentials management leveraging Vault☆14Updated this week
- ☆14Aug 24, 2024Updated last year
- Raptor - Web application firewall [ Stable ]☆15Dec 8, 2016Updated 9 years ago
- Content for the supergraph.io website☆16Jun 18, 2024Updated last year
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Feb 4, 2021Updated 5 years ago
- The DevSecOps toolset for REST APIs☆278Jan 13, 2023Updated 3 years ago
- graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors☆35Aug 13, 2019Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 3 years ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆21Aug 23, 2022Updated 3 years ago
- A silly simple, silly small XML output for tap/tape tests to convert them to junit☆18Oct 8, 2024Updated last year
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆21Nov 9, 2021Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…