The clever vulnerability dependency finder
☆96May 10, 2022Updated 3 years ago
Alternatives and similar repositories for patton
Users that are interested in patton are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Security Dependency Orchestrator Service☆87Dec 11, 2020Updated 5 years ago
- A Chaos Engineering swiss army knife☆45Nov 1, 2019Updated 6 years ago
- Data transformation☆23Apr 18, 2021Updated 4 years ago
- Improves Ubuntu security feed compatibility allowing it to be consumed by Debian vulnerability report tool, debsecan.☆12May 30, 2021Updated 4 years ago
- The DevSecOps toolset for REST APIs☆277Jan 13, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Tiny ORM for graph databases: Neo4j, RedisGraph, AWS Neptune or Gremlin☆35Feb 25, 2021Updated 5 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 3 years ago
- Wordpress.org svn repositories spider☆12Aug 4, 2014Updated 11 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Monitors Github for leaked secrets☆205Oct 25, 2024Updated last year
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- explainer for AAuth☆40Apr 5, 2026Updated last week
- ☆14Oct 3, 2018Updated 7 years ago
- Remote Memory Acquisition Tool☆253Sep 22, 2020Updated 5 years ago
- A demonstration of a continuous integration pipeline focused on security testing☆31Oct 5, 2018Updated 7 years ago
- Making CoreOS' Clair easily work in CI/CD pipelines☆29Sep 10, 2023Updated 2 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Dec 3, 2021Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated 2 months ago
- Lockheed Martin developed utility to compare two CycloneDX SBOMs☆19Oct 21, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The Pentester's Swiss Army Knife☆27Jan 25, 2020Updated 6 years ago
- NTLM auth plugin for HTTPie☆19Dec 8, 2016Updated 9 years ago
- A utility for validating and parsing Common Platform Enumeration (CPE) v2.2 and v2.3 as originally defined by MITRE and maintained by NIS…☆54Jan 26, 2026Updated 2 months ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- Elegant deployment with Fabric and Puppet.☆116Mar 26, 2026Updated 2 weeks ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆740Mar 18, 2024Updated 2 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Aug 24, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Report missing advisories and corrections on OSS Index☆17Jan 19, 2023Updated 3 years ago
- Chrome extension to aid in finding DOMXSS by simple taint analysis of string values.☆80Jun 1, 2019Updated 6 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆449Jul 17, 2023Updated 2 years ago
- Vulnmine searches for vulnerable hosts using MS SCCM host / software inventory data with NIST NVD Vulnerability feed data.☆38Jul 6, 2023Updated 2 years ago
- ☆12Dec 23, 2021Updated 4 years ago