The Security Dependency Orchestrator Service
☆87Dec 11, 2020Updated 5 years ago
Alternatives and similar repositories for deeptracy
Users that are interested in deeptracy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The clever vulnerability dependency finder☆96May 10, 2022Updated 3 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- A Chaos Engineering swiss army knife☆45Nov 1, 2019Updated 6 years ago
- Data transformation☆23Apr 18, 2021Updated 4 years ago
- The scalable, auditable and high-performance tamper-evident log project☆102Feb 27, 2020Updated 6 years ago
- Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider☆16Dec 12, 2017Updated 8 years ago
- Improves Ubuntu security feed compatibility allowing it to be consumed by Debian vulnerability report tool, debsecan.☆12May 30, 2021Updated 4 years ago
- GCN implementation on top of Apache Spark☆16Oct 30, 2022Updated 3 years ago
- Raptor - Web application firewall [ Stable ]☆15Dec 8, 2016Updated 9 years ago
- Repository of files for independent anti-phishing campaign, trusted information and more☆10May 14, 2020Updated 5 years ago
- The DevSecOps toolset for REST APIs☆277Jan 13, 2023Updated 3 years ago
- explainer for Agent Auth☆36Mar 5, 2026Updated 2 weeks ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆87Feb 26, 2021Updated 5 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- A library to access to basic functions of hardware cryptocurrencies wallets☆10Mar 17, 2019Updated 7 years ago
- Find API keys in your code.☆40Aug 18, 2021Updated 4 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- Repository characteristics☆14Mar 16, 2026Updated last week
- A demonstration of a continuous integration pipeline focused on security testing☆31Oct 5, 2018Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated last month
- A gitleaks config that has most of Microsoft's deprecated credscan rules ported to it.☆13Apr 3, 2022Updated 3 years ago
- Default VPC resource management for AWS Accounts☆13Feb 1, 2023Updated 3 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- A silly simple, silly small XML output for tap/tape tests to convert them to junit☆18Oct 8, 2024Updated last year
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Monitoring attacks with elastick, kibana, grok, logstash and beats☆20Mar 2, 2017Updated 9 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Nov 21, 2018Updated 7 years ago
- A Wireshark dissector for Bluetooth Low Energy (BLE) advertisement packets of Apple Continuity, Microsoft CDP and Garmin proprietary prot…☆17Mar 13, 2020Updated 6 years ago
- The Marinus NodeJS UI and the supporting Python analysis scripts.☆62Mar 10, 2026Updated last week
- A TOTP based port knocking service. Every time slot, it generates a sequence of ports that must be knocked (in a correct order) before th…☆31May 6, 2021Updated 4 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- 🌊 Dockerfiles for apps I use. Also take a look at https://github.com/security-dockerfiles☆25Dec 24, 2020Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)☆26Mar 10, 2020Updated 6 years ago
- Abstraction layer for Xilinx FPGAs☆15Aug 9, 2019Updated 6 years ago
- An example code to see how integrate Karma with VSCode debugger.☆10Apr 2, 2017Updated 8 years ago