Checkmarx / 2msLinks
Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git
☆94Updated last week
Alternatives and similar repositories for 2ms
Users that are interested in 2ms are comparing it to the libraries listed below
Sorting:
- ☆76Updated 5 months ago
- boostsecurityio/lotp☆128Updated 3 months ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆122Updated 4 months ago
- ☆187Updated 3 months ago
- ☆111Updated 2 years ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆156Updated 10 months ago
- boostsecurityio/poutine☆306Updated 2 weeks ago
- Gram is Klarna's own threat model diagramming tool☆319Updated this week
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆293Updated 5 months ago
- Protect against subdomain takeover☆92Updated last year
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 7 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆136Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- OWASP Foundation Web Respository☆97Updated 5 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 3 months ago
- An open-source collection of API key rotation tutorials.☆70Updated 3 weeks ago
- Scans your Github Actions for security issues☆77Updated this week
- AI featured threat modeling and security review action☆44Updated 8 months ago
- ☆179Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆208Updated this week
- Identify hardcoded secrets in static structured text (version 2)☆91Updated 5 months ago
- OWASP Foundation Web Respository☆45Updated last month
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated last month
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 5 months ago
- Stalker, the Extensible Attack Surface Management tool.☆86Updated last month
- A full insecure kubernetes application for testing security tools☆89Updated 2 months ago
- The security workflow engine!☆118Updated this week
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆294Updated last year