DistriNet / OAuchLinks
OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations
☆12Updated 4 months ago
Alternatives and similar repositories for OAuch
Users that are interested in OAuch are comparing it to the libraries listed below
Sorting:
- OWASP Top 10 Infrastructure Security Risks☆44Updated 3 months ago
- A Python package to download Zone Files from the Centralized Zone Data Service hosted by ICAAN.☆17Updated 7 months ago
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆50Updated this week
- Global Security Database Tools☆43Updated 2 years ago
- Scanner to identify dangling DNS records and subdomain takeovers☆49Updated last year
- A list of user agents belonging to common web scanners.☆40Updated 3 years ago
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- ☆10Updated 3 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Updated last year
- ☆114Updated 2 years ago
- EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple …☆28Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆13Updated 6 months ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆18Updated 2 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆141Updated 11 months ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Updated last year
- boostsecurityio/lotp☆137Updated last week
- A GitHub Action that creates a SBOM from your application so you can meet compliance and security requirements. Add this to your dev, sta…☆25Updated 2 years ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆61Updated 3 years ago
- Dependency Combobulator☆95Updated 2 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆36Updated 3 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- A project to visualize the software supply chain☆58Updated 2 years ago
- ☆11Updated last year
- 📚A curated list of product security resources.☆22Updated 7 months ago
- An open-source collection of API key rotation tutorials.☆76Updated 4 months ago
- Short deep dive into Threat Hunting on AWS☆17Updated 2 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago