Mobile-IoT-Security-Lab / GHAST
GitHub Actions Security Tester
☆11Updated 2 years ago
Alternatives and similar repositories for GHAST
Users that are interested in GHAST are comparing it to the libraries listed below
Sorting:
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- Sharing software supply chain security open source projects☆49Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆39Updated this week
- A Security Scanner for Go☆26Updated 6 years ago
- InfoSec OpenAI Examples☆19Updated last year
- A place to systematically store software bill of materials (SBOM) documents.☆46Updated last year
- ☆43Updated 10 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- ☆17Updated 3 years ago
- A community collection of security reviews of open source software components.☆93Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆50Updated this week
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated 2 weeks ago
- A web security research tool for DOM testing☆21Updated this week
- A security-first linter for code that shouldn't need linting☆16Updated last year
- using ML models for red teaming☆43Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 7 months ago
- Dependency Combobulator☆93Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 3 months ago
- WAF bypass PoC☆47Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Automatically fuzz Rust projects from scratch☆55Updated last year
- DEbian Cve REproducer Tool☆24Updated last year
- ☆35Updated 9 months ago
- Collection of Semgrep rules for security analysis☆10Updated last year