Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teams
☆78Mar 13, 2026Updated last week
Alternatives and similar repositories for Flow
Users that are interested in Flow are comparing it to the libraries listed below
Sorting:
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆79Sep 1, 2025Updated 6 months ago
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated 2 months ago
- Security tool against dependency typosquatting attacks☆55Updated this week
- OWASP Foundation web repository☆22Jan 7, 2026Updated 2 months ago
- Open source templates you can use to bootstrap your security programs☆893Dec 28, 2025Updated 2 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- docker env for ios research on a mac host☆28Jun 12, 2025Updated 9 months ago
- 💅🏽 analyzes your github actions☆99Feb 9, 2026Updated last month
- ReARM - Release-Level Supply Chain Evidence Platform. SBOMs, xBOMs and every other artifact - stored for 10+ years, versioned and audit-r…☆102Updated this week
- ☆17Feb 3, 2026Updated last month
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆122Jul 19, 2025Updated 8 months ago
- ☆16Aug 29, 2025Updated 6 months ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆356Updated this week
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆76Mar 12, 2026Updated last week
- Generate xBOMs enriched with AI, SaaS, Crypto and more using Static Code Analysis☆27Jan 22, 2026Updated last month
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated last month
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated last month
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 5 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated last month
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆30Feb 23, 2026Updated 3 weeks ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated this week
- A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.☆154Feb 9, 2026Updated last month
- Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS.☆374Dec 6, 2025Updated 3 months ago
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcro…☆75Mar 12, 2026Updated last week
- Identify hardcoded secrets in static structured text (version 2)☆98Feb 5, 2025Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- ☆28Oct 2, 2025Updated 5 months ago
- 📦 Produce secure packages and containers with declarative configurations☆284Updated this week
- AWS honey token manager☆90Aug 1, 2024Updated last year
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Sep 2, 2025Updated 6 months ago
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆81Mar 6, 2025Updated last year
- Toolchain for the evaluation of different devsecops practices☆44Updated this week
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- JAVA Spring-Boot implementation of REST API for OpenVAS Security Vulnerability Scanner. REST API is using gvm-cli in order to communicate…☆25Jan 17, 2022Updated 4 years ago