Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git
☆144Feb 20, 2026Updated last week
Alternatives and similar repositories for 2ms
Users that are interested in 2ms are comparing it to the libraries listed below
Sorting:
- This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided h…☆11Jun 23, 2023Updated 2 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Feb 13, 2026Updated 2 weeks ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Nov 21, 2021Updated 4 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- A CLI project wrapping application security testing (AST) APIs☆59Updated this week
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Provides a consistent API around some existing scanning tools to integrate them with the rest of the tool kit☆17Feb 16, 2026Updated last week
- Checkmarx CxFlow GitHub Action with SARIF output☆54Nov 13, 2025Updated 3 months ago
- A gitleaks config that has most of Microsoft's deprecated credscan rules ported to it.☆13Apr 3, 2022Updated 3 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- A very vulnerable implementation of a GraphQL API.☆17Feb 12, 2026Updated 2 weeks ago
- Java library for running SonarQube in tests☆19Feb 20, 2026Updated last week
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastruct…☆2,574Updated this week
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆61May 29, 2022Updated 3 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 3 months ago
- Things that would cause a git leaks scan to freak out☆20Feb 11, 2026Updated 2 weeks ago
- A tool for detecting sensitive data in code repositories☆18Updated this week
- Will share some interesting writeups here :)☆18Oct 18, 2023Updated 2 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆18Feb 22, 2017Updated 9 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 2 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Feb 7, 2016Updated 10 years ago
- OWASP Benchmark Project Utilities - Provides scorecard generation and crawling tools for Benchmark style test suites.☆20Updated this week
- Rapid - Specification, tools and libraries to support the development and adoption of simple REST-based APIs.☆20Dec 1, 2023Updated 2 years ago
- The security workflow engine!☆136Nov 20, 2025Updated 3 months ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆28Apr 30, 2025Updated 10 months ago
- CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection☆21Sep 1, 2021Updated 4 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Aug 26, 2025Updated 6 months ago
- Anti-Ransomware to mitigate and neutralize Ryuk Threat.☆19May 24, 2024Updated last year
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Jul 4, 2017Updated 8 years ago
- A tool that provides htop-like functionality for any point in time, utilizing the Spyderbat APIs☆23Mar 4, 2025Updated 11 months ago
- Data exfiltration using DNS☆24Dec 28, 2019Updated 6 years ago
- an OSINT tool to scrape sub domains from the Virus Total API☆24Dec 2, 2022Updated 3 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- ☆22Updated this week
- Automated submission of FoD and SSC vulnerabilities to external systems☆25May 1, 2024Updated last year
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Extract git related information (file shas, commit shas) from your hosted source version control system☆23Jan 31, 2024Updated 2 years ago