CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.
☆15Jun 9, 2021Updated 4 years ago
Alternatives and similar repositories for pixi-crs
Users that are interested in pixi-crs are comparing it to the libraries listed below
Sorting:
- Repository for OWASP Code Review document☆17Jun 24, 2014Updated 11 years ago
- A documentation generator for NASL.☆18May 31, 2022Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Dec 22, 2022Updated 3 years ago
- Github Audit Tool for Organizations☆37Feb 20, 2026Updated last week
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago
- An insecure example application (Java)☆33Aug 19, 2025Updated 6 months ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- ☆16Feb 19, 2026Updated last week
- ☆15Dec 3, 2020Updated 5 years ago
- A blog app written in Flask☆15Jan 3, 2015Updated 11 years ago
- TSE-Simulator according to BSI TR-03153☆10Apr 21, 2021Updated 4 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- The official Bento distribution - orchestration and deployment infrastructure for the Bento platform.☆10Feb 24, 2026Updated last week
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- A serverless application for processing AWS GuardDuty findings.☆11Sep 7, 2018Updated 7 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- This plugin provides native logstash instrumentation for monitoring, including: a handler for sending events to logstash.☆10Apr 28, 2021Updated 4 years ago
- Chrome extension that redacts potentially sensitive information before querying ChatGPT☆12Aug 10, 2023Updated 2 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Step by step instructions on how to use the Jenkins Kubernetes plugin for different use cases.☆11Aug 9, 2019Updated 6 years ago
- 🐑 Monitor the status of a folder on your system☆12Jan 13, 2026Updated last month
- ChatGPT-like chat bot webapp built with React, Express and TailwindCSS using ollama.ai as backend.☆13Nov 23, 2023Updated 2 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆22Feb 25, 2026Updated last week
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- ☆10Feb 27, 2019Updated 7 years ago
- Website for GrimoireLab☆10Jun 5, 2018Updated 7 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- Scalable task execution orchestrator for CodeOcean.☆10Updated this week
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- A static analysis framework for NASL.☆14Nov 30, 2022Updated 3 years ago
- ☆13Dec 28, 2024Updated last year