The clever vulnerability dependency finder
☆96May 10, 2022Updated 3 years ago
Alternatives and similar repositories for patton
Users that are interested in patton are comparing it to the libraries listed below
Sorting:
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- The Security Dependency Orchestrator Service☆87Dec 11, 2020Updated 5 years ago
- Parasitic Computing Framework☆15Oct 13, 2020Updated 5 years ago
- A Chaos Engineering swiss army knife☆45Nov 1, 2019Updated 6 years ago
- The scalable, auditable and high-performance tamper-evident log project☆102Feb 27, 2020Updated 6 years ago
- The DevSecOps toolset for REST APIs☆278Jan 13, 2023Updated 3 years ago
- High-performance, real-time, multi-location data obfuscation tool☆12Mar 6, 2020Updated 5 years ago
- Enables scanning of docker builds in CircleCi for OS package vulnerabilities.☆13Mar 6, 2020Updated 5 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- 🚀 Rapid AI-driven prototyping in Python using GPT-3, ChatGPT, and more 🤖. Provide doctests, and let the AI do the rest!☆14Sep 23, 2025Updated 5 months ago
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- Monitors Github for leaked secrets☆205Oct 25, 2024Updated last year
- Making CoreOS' Clair easily work in CI/CD pipelines☆29Sep 10, 2023Updated 2 years ago
- [Free Training Workshop] Security Controls for Kubernetes☆15Mar 15, 2021Updated 4 years ago
- ☆11May 25, 2020Updated 5 years ago
- ☆15Nov 8, 2021Updated 4 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- SIG Security - Software Bill of Materials☆19Aug 26, 2022Updated 3 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 weeks ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- Bridge services dedicated to keycloak interactions☆17Updated this week
- ☆14Apr 23, 2019Updated 6 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆35Sep 10, 2017Updated 8 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated last month
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- From monolith to containerized microservices to serverless☆14Dec 1, 2018Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- A wordpress security auditor! Audit your wordpress application for security issues with even 1 request.☆40Jan 13, 2026Updated last month
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆160Mar 12, 2024Updated last year
- Report missing advisories and corrections on OSS Index☆17Jan 19, 2023Updated 3 years ago