JBAhire / awesome-api-security-essentialsLinks
Awesome API Security: A Curated Collection of Resources for Bulletproof API Protection!
☆61Updated 2 years ago
Alternatives and similar repositories for awesome-api-security-essentials
Users that are interested in awesome-api-security-essentials are comparing it to the libraries listed below
Sorting:
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Updated last year
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆126Updated 4 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Updated 2 weeks ago
- A curated list of Awesome Security Challenges.☆211Updated last year
- ☆75Updated 10 months ago
- cloudgrep is grep for cloud storage☆326Updated 11 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- Customized CVE FEED Notifier☆114Updated 9 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆102Updated 2 weeks ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆177Updated 9 months ago
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- Efficient DevSecOps☆47Updated 7 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆167Updated 2 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆142Updated 11 months ago
- ☆114Updated 2 years ago
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆247Updated this week
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆263Updated 7 months ago
- Identify hardcoded secrets in static structured text (version 2)☆97Updated last year
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated 2 years ago
- Gram is Klarna's own threat model diagramming tool☆328Updated 2 weeks ago
- ☆142Updated last month
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆176Updated 2 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆159Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆259Updated 4 months ago
- ☆185Updated last week
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109Updated 8 months ago
- Curated list of security tools☆66Updated 2 years ago