Checkmarx / dustilockLinks
DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.
☆40Updated 4 years ago
Alternatives and similar repositories for dustilock
Users that are interested in dustilock are comparing it to the libraries listed below
Sorting:
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆156Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 10 months ago
- Scans your Github Actions for security issues☆87Updated 3 weeks ago
- ☆114Updated 2 years ago
- Fetch the details of assets hosted on AWS.☆89Updated 2 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆180Updated this week
- How GitHub Actions workflows can be hacked☆174Updated last year
- Scan DockerHub images that match a keyword to find secrets.☆61Updated 4 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆34Updated 7 months ago
- Manager of third-party sources of Semgrep rules 🗂☆90Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 4 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆140Updated last month
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated 2 weeks ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated last year
- A project to visualize the software supply chain☆55Updated 2 years ago
- boostsecurityio/lotp☆138Updated last month
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆136Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- ☆205Updated 2 weeks ago
- An open-source collection of API key rotation tutorials.☆75Updated 3 months ago
- WAF bypass PoC☆49Updated 2 years ago
- Protect against subdomain takeover☆94Updated 4 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 9 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 8 months ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆50Updated 5 months ago
- Blazing fast GraphQL discovery & fingerprinting toolbox.☆123Updated 2 years ago
- Vulnerability Scan with Nuclei☆271Updated 3 weeks ago