Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git
☆149Mar 30, 2026Updated last week
Alternatives and similar repositories for 2ms
Users that are interested in 2ms are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆41Nov 21, 2021Updated 4 years ago
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastruct…☆2,605Apr 4, 2026Updated last week
- A CLI project wrapping application security testing (AST) APIs☆59Updated this week
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Mar 21, 2026Updated 3 weeks ago
- ☆12Mar 31, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Data exfiltration using DNS☆26Dec 28, 2019Updated 6 years ago
- Checkmarx Scan and Result Orchestration☆100Updated this week
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Things that would cause a git leaks scan to freak out☆22Mar 23, 2026Updated 2 weeks ago
- Checkmarx Python SDK☆30Mar 25, 2026Updated 2 weeks ago
- This action checks the version tags in your repository to ensure correct semantic versioning behavior.☆13Updated this week
- The security workflow engine!☆138Nov 20, 2025Updated 4 months ago
- A docker container that jails an LLM CLI like codex, gemini, or claude code.☆35Oct 14, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆30Jan 12, 2023Updated 3 years ago
- Extending Kubernetes Workshop☆14Jul 14, 2023Updated 2 years ago
- Grab some/all of CodeQL CLI binary, QL library, VSCode starter workspace, VSCode and VSCode QL extension☆11Mar 26, 2026Updated 2 weeks ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆19Feb 22, 2017Updated 9 years ago
- Run AI coding agents safely in Docker containers. Your code stays isolated - no surprises on your host machine.☆44Feb 11, 2026Updated 2 months ago
- SARIF formatter for PHPStan☆13Mar 1, 2026Updated last month
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆327Aug 13, 2025Updated 7 months ago
- Headers Burp Extension☆19Jun 7, 2023Updated 2 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Feb 7, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OWASP Benchmark Project Utilities - Provides scorecard generation and crawling tools for Benchmark style test suites.☆20Mar 24, 2026Updated 2 weeks ago
- MCP Ethical Hacking Security sample for educational☆19Sep 16, 2025Updated 6 months ago
- ☆47Sep 3, 2025Updated 7 months ago
- ☆12Oct 23, 2025Updated 5 months ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆268Mar 14, 2026Updated 3 weeks ago
- A gitleaks config that has most of Microsoft's deprecated credscan rules ported to it.☆13Apr 3, 2022Updated 4 years ago
- Golang tool to pull and summarize NPM license info☆13Jan 4, 2023Updated 3 years ago
- This GitHub Action runs the microsoft/component-detection library to automate dependency extraction at build time.☆20Updated this week
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tool to fuzz for interesting vhost.☆24Jan 8, 2025Updated last year
- Fortify SonarQube Plugin☆22Jan 19, 2021Updated 5 years ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆28Apr 30, 2025Updated 11 months ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆52Jun 21, 2025Updated 9 months ago
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago