Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks
☆63May 29, 2022Updated 3 years ago
Alternatives and similar repositories for chainjacking
Users that are interested in chainjacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆41Nov 21, 2021Updated 4 years ago
- This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided h…☆11Jun 23, 2023Updated 2 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- ☆12Jan 9, 2023Updated 3 years ago
- This open-source project tracks CuteBoi's activity over time as there are evidence the actor is still active. All information provided he…☆27Jul 23, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Checkmarx Scan and Result Orchestration☆100Updated this week
- Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git☆149Mar 30, 2026Updated last week
- ☆32May 1, 2025Updated 11 months ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- Inspect repository data, including countries and organizations of stargazers and forkers.☆41Mar 1, 2024Updated 2 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- JEST: N+1-version Differential Testing of Both JavaScript Engines☆14Jun 1, 2021Updated 4 years ago
- UpCy automatically finds compatible updates for Maven dependencies.☆12Feb 8, 2026Updated 2 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- React Suspended is an educational frontend application riddled with security vulnerabilities☆10Jan 29, 2024Updated 2 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- A comprehensive malware detection and dynamic analysis system, designed to analyse malware samples and benign files & classify them using…☆15Sep 18, 2023Updated 2 years ago
- ☆12Aug 8, 2022Updated 3 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆52Jan 15, 2026Updated 2 months ago
- Scrapes awesome-opensource-israel's readme and displays all projects☆26Jun 21, 2023Updated 2 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 5 months ago
- ☆44Jun 2, 2021Updated 4 years ago
- This is a repository for the LinkedIn Learning course Fine-tuning LLMs for Cybersecurity: Mistral, LLaMa, AutoTrain, AutoGen☆18Oct 30, 2024Updated last year
- Hands-on practical use of HTTP security headers as browser security controls to help secure web applications☆20Jan 14, 2023Updated 3 years ago
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated 3 months ago
- ☆12Nov 21, 2023Updated 2 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Jul 15, 2022Updated 3 years ago
- Librería desarrollada en python para acceder a los servicios web públicos del Portal de la Dirección General del Catastro y obtener los r…☆11Apr 6, 2018Updated 8 years ago
- CRLF Detection based on @BlackFan 's work See link below☆17Mar 14, 2024Updated 2 years ago
- A Pytorch implementation of "Data-Free Learning of Student Networks" (ICCV 2019).☆18Oct 8, 2019Updated 6 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Subtitles service for Subscenter.org Kodi (XBMC): Helix - Krypton☆13Oct 14, 2018Updated 7 years ago
- Linux Bootloader☆15Jun 17, 2020Updated 5 years ago