Checkmarx / 2ms
Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git
☆83Updated this week
Alternatives and similar repositories for 2ms:
Users that are interested in 2ms are comparing it to the libraries listed below
- ☆161Updated 4 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated 11 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆89Updated 11 months ago
- boostsecurityio/lotp☆110Updated last month
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆101Updated 11 months ago
- boostsecurityio/poutine☆243Updated last week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆266Updated last month
- An open-source collection of API key rotation tutorials.☆63Updated last month
- A tool for preventing the installation of malicious PyPI and npm packages☆108Updated last month
- Security tool against dependency typosquatting attacks☆39Updated this week
- A full insecure kubernetes application for testing security tools☆64Updated last week
- Runtime Security Solution for your CI/CD Pipeline☆93Updated 4 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆132Updated 2 weeks ago
- Monorepo of Labs for the Security Knowledge Framework (SKF)☆32Updated 5 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆186Updated last week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆63Updated this week
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆97Updated 2 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆37Updated last month
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated this week
- Scans your Github Actions for security issues☆56Updated last month
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆57Updated 2 years ago
- Sunshine - SBOM visualization tool☆28Updated this week
- Nuclei plugins to audit Chrome extensions☆64Updated 6 months ago
- ☆110Updated last year
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆27Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆82Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆281Updated this week
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 4 months ago
- OWASP Foundation Web Respository☆81Updated 4 months ago
- Protect against subdomain takeover☆92Updated 7 months ago