JosephTLucas / lintMLLinks
A security-first linter for code that shouldn't need linting
☆16Updated last year
Alternatives and similar repositories for lintML
Users that are interested in lintML are comparing it to the libraries listed below
Sorting:
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated 3 weeks ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- ☆36Updated 10 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- using ML models for red teaming☆43Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆23Updated last month
- ☆30Updated last month
- A GitHub Actions Supply Chain CTF / Goat☆19Updated last week
- ☆47Updated 11 months ago
- WAF bypass PoC☆48Updated last year
- ☆57Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 9 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 7 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated last year
- source code for the offsecml framework☆40Updated 11 months ago
- Manager of third-party sources of Semgrep rules 🗂☆86Updated 10 months ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 6 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 9 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- Nuclei plugins to audit Chrome extensions☆64Updated 10 months ago
- A fun POC that is built to understand AI security agents.☆30Updated 5 months ago
- ☆67Updated 6 months ago
- Spec and Sample code for Identifying and Reducing Permission Explosion☆12Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 8 months ago
- AWS SSO serverless phishing API.☆32Updated 3 years ago
- A web security research tool for DOM testing☆21Updated this week
- ☆111Updated last year
- Additional active scan checks for BURP☆27Updated 8 months ago