Mobile-IoT-Security-Lab / GHAST
GitHub Actions Security Tester
☆11Updated 2 years ago
Alternatives and similar repositories for GHAST:
Users that are interested in GHAST are comparing it to the libraries listed below
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated last month
- My collection of Semgrep rules for vulnerability detection on source code (swift, java)☆34Updated last year
- Development of the NIST vulnerability data ontology (Vulntology).☆39Updated this week
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- ☆17Updated 2 years ago
- Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis.☆21Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆44Updated 9 months ago
- using ML models for red teaming☆43Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- Static Token And Credential Scanner☆96Updated last year
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- A curated list of argument injection vectors☆40Updated 2 months ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 10 months ago
- ☆21Updated 5 years ago
- A community collection of security reviews of open source software components.☆93Updated last year
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Go module that returns supported regions for a service or supported services for a region☆17Updated 10 months ago
- Semgrep rules to identify GWT attack surface☆11Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 3 months ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 5 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆49Updated last week
- ☆32Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Scan and import relevant requests directly to burp!☆9Updated 5 years ago