Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks
☆61May 29, 2022Updated 3 years ago
Alternatives and similar repositories for chainjacking
Users that are interested in chainjacking are comparing it to the libraries listed below
Sorting:
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Nov 21, 2021Updated 4 years ago
- This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided h…☆11Jun 23, 2023Updated 2 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- ☆12Jan 9, 2023Updated 3 years ago
- React Suspended is an educational frontend application riddled with security vulnerabilities☆10Jan 29, 2024Updated 2 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- ☆15Apr 13, 2021Updated 4 years ago
- OpenAPI 3.x parser☆11May 19, 2023Updated 2 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 3 months ago
- GitHub Action adding a comment with information about new npm dependencies detected in a pull request☆17Mar 30, 2024Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15May 14, 2024Updated last year
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆51Jan 15, 2026Updated last month
- Cool One Liners at one place to make your recon and bug bounty skills better !☆15Oct 3, 2020Updated 5 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- Simplified pure Java http server☆11May 20, 2022Updated 3 years ago
- AMF Plugin for JMeter☆37May 24, 2012Updated 13 years ago
- Visualize your project security vulnerabilities as a pie chart in the terminal☆25Jul 12, 2025Updated 7 months ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Hands-on practical use of HTTP security headers as browser security controls to help secure web applications☆19Jan 14, 2023Updated 3 years ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆75Feb 13, 2026Updated 2 weeks ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- ☆43Aug 27, 2025Updated 6 months ago
- Task management for small-group organizers.☆18Jul 23, 2022Updated 3 years ago
- ☆57Dec 26, 2021Updated 4 years ago
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆32Feb 4, 2026Updated 3 weeks ago
- ☆31May 1, 2025Updated 9 months ago
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- a repository for documenting and coordinating the foundation's security collaboration space☆41Jan 14, 2026Updated last month
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- ☆27Jun 18, 2024Updated last year
- A ton of fixes/enhancements to upstream SvnBridge project (at http://svnbridge.codeplex.com ). License intended to be identical to upstre…☆10Oct 30, 2015Updated 10 years ago
- TEAM Mentor 3.x Released Code☆16Aug 5, 2016Updated 9 years ago
- ☆13Aug 5, 2025Updated 6 months ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year