Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks
☆61May 29, 2022Updated 3 years ago
Alternatives and similar repositories for chainjacking
Users that are interested in chainjacking are comparing it to the libraries listed below
Sorting:
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Nov 21, 2021Updated 4 years ago
- scans popular packages and alerts in cases there is suspicion of an account takeover☆41Feb 20, 2022Updated 4 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- ☆12Jan 9, 2023Updated 3 years ago
- Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git☆146Mar 12, 2026Updated last week
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- GitHub Action adding a comment with information about new npm dependencies detected in a pull request☆17Mar 30, 2024Updated last year
- React Suspended is an educational frontend application riddled with security vulnerabilities☆10Jan 29, 2024Updated 2 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆51Jan 15, 2026Updated 2 months ago
- ☆12Aug 8, 2022Updated 3 years ago
- Scrapes awesome-opensource-israel's readme and displays all projects☆26Jun 21, 2023Updated 2 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- ☆43Jun 2, 2021Updated 4 years ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated 2 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Jul 15, 2022Updated 3 years ago
- CRLF Detection based on @BlackFan 's work See link below☆16Mar 14, 2024Updated 2 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Automatic uploads of new Switch BCAT content. Thanks to CitrusBolt for his bcat-ftpd: https://github.com/citrusbolt/bcat-ftpd☆10Jun 16, 2023Updated 2 years ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆76Mar 12, 2026Updated last week
- Visualize your project security vulnerabilities as a pie chart in the terminal☆25Jul 12, 2025Updated 8 months ago
- Nuclei Templates☆14Jan 13, 2023Updated 3 years ago
- Useful tools and Examples made by Checkmarx Professional Services☆40Sep 17, 2025Updated 6 months ago
- offensive notes & resources☆43Apr 7, 2025Updated 11 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆63May 31, 2025Updated 9 months ago
- Cool One Liners at one place to make your recon and bug bounty skills better !☆15Oct 3, 2020Updated 5 years ago
- ☆49Mar 25, 2022Updated 3 years ago
- archives for Tongji CTF 2017☆10Oct 25, 2023Updated 2 years ago
- get popular npm packages☆44Mar 26, 2025Updated 11 months ago
- Geolocate your files!☆16Jan 7, 2022Updated 4 years ago
- Extensible Azure Security Tool - Documentation☆83Jun 1, 2023Updated 2 years ago
- Checkmarx Scan Github Action☆29Jul 12, 2024Updated last year
- Security issues I've reported in Edge☆47Oct 19, 2022Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year