Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teams
☆80Mar 30, 2026Updated last week
Alternatives and similar repositories for Flow
Users that are interested in Flow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆44Sep 16, 2025Updated 6 months ago
- Audit your Node version for known CVEs and patches☆26Aug 20, 2025Updated 7 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆78Sep 1, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Security tool against dependency typosquatting attacks☆55Mar 31, 2026Updated last week
- Open source templates you can use to bootstrap your security programs☆897Dec 28, 2025Updated 3 months ago
- 💅🏽 analyzes your github actions☆99Updated this week
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- docker env for ios research on a mac host☆28Jun 12, 2025Updated 9 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Apr 3, 2026Updated last week
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Dec 2, 2024Updated last year
- ReARM - Release-Level Supply Chain Evidence Platform. SBOMs, xBOMs and every other artifact - stored for 10+ years, versioned and audit-r…☆111Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆124Jul 19, 2025Updated 8 months ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆359Updated this week
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆80Updated this week
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 2 months ago
- App Startup 🚀 + Hilt 🗡 (a sample project that combines both to provide dependencies to Initializers)☆18Jan 16, 2025Updated last year
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 5 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆32Feb 23, 2026Updated last month
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Mar 28, 2026Updated last week
- A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.☆155Feb 9, 2026Updated 2 months ago
- Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS.☆376Dec 6, 2025Updated 4 months ago
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcro…☆76Apr 1, 2026Updated last week
- Identify hardcoded secrets in static structured text (version 2)☆99Feb 5, 2025Updated last year
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆53Sep 29, 2024Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Sep 2, 2025Updated 7 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆24Jul 31, 2025Updated 8 months ago
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆81Mar 6, 2025Updated last year
- ☆42Oct 13, 2025Updated 5 months ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 7 months ago
- A Python-based automation tool for interacting with the Burp Suite API to run scans and retrieve vulnerability data programmatically.☆10Oct 3, 2022Updated 3 years ago
- A collection of permissively licensed Semgrep rules.☆22Jul 5, 2024Updated last year