Checkmarx / chainjacking
Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks
β57Updated 2 years ago
Related projects β
Alternatives and complementary repositories for chainjacking
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β131Updated last year
- Dependency Combobulatorβ89Updated 10 months ago
- π§ͺ Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.β33Updated last month
- Proof-of-concept code for research into GitHub Actions Cache poisoning.β22Updated 3 months ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.β36Updated 3 years ago
- boostsecurityio/lotpβ102Updated 7 months ago
- WAF bypass PoCβ43Updated last year
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.0, purl, and versβ¦β98Updated last week
- β110Updated last year
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β110Updated last year
- Nuclei plugins to audit Chrome extensionsβ64Updated 4 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chainβ86Updated 9 months ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderβ138Updated 3 years ago
- β137Updated 3 weeks ago
- A project to visualize the software supply chainβ36Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,β¦β126Updated 9 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.β53Updated 2 months ago
- Manager of third-party sources of Semgrep rules πβ76Updated 4 months ago
- How GitHub Actions workflows can be hackedβ106Updated 3 months ago
- A comprehensive list of software composition analysis tools.β127Updated 5 months ago
- β168Updated this week
- Protect against subdomain takeoverβ92Updated 6 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.β45Updated 2 months ago
- Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and gitβ80Updated this week
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ98Updated 9 months ago
- ποΈ STRIDE vs. ASVS equivalence tableβ75Updated 3 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)β22Updated 4 months ago
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)β39Updated 3 months ago
- The security workflow engine!β73Updated this week