Rapidly identify and mitigate container security vulnerabilities with generative AI.
☆210Feb 5, 2026Updated 3 months ago
Alternatives and similar repositories for vulnerability-analysis
Users that are interested in vulnerability-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- Continuous Security on AWS Workshop (CSOA) published by Pearson☆11Aug 14, 2022Updated 3 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 3 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Morpheus SDK☆600Updated this week
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- Demonstrate target tracking autoscaling for ECS services.☆10Mar 4, 2019Updated 7 years ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated 2 years ago
- Static analysis for llvm☆20Mar 31, 2015Updated 11 years ago
- GitHub Action to generate GitHub Advanced Security (GHAS) metrics report☆18Feb 1, 2025Updated last year
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated 2 months ago
- This is a wordlist that is optimized for faster cracking speed, and is more aligned with the actual default wireless passwords on Netgear…☆24Dec 31, 2023Updated 2 years ago
- Vulnerability and security bulletins related to Palantir software products.☆13Mar 3, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆22Nov 11, 2023Updated 2 years ago
- MLX Implementation of Recursive Reasoning with Tiny Networks☆78Oct 11, 2025Updated 6 months ago
- App release with terraform and helm☆37Jul 2, 2025Updated 10 months ago
- Move Vulnerability Database☆86Feb 4, 2026Updated 3 months ago
- Automating the testing of prompt defenses.☆47Jan 28, 2024Updated 2 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Mar 7, 2023Updated 3 years ago
- OWASP Foundation Web Respository☆10May 1, 2026Updated last week
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated 2 months ago
- OWASP Foundation web repository☆70Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆121Apr 17, 2026Updated 3 weeks ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆500Updated this week
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Implementing TCP/IP in Rust leveraging eBPF/XDP☆21Mar 30, 2025Updated last year
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆175Apr 23, 2025Updated last year
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 9 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- TTS for Singlish using Tacotron2, the IMDA corpus, and Pachyderm.☆11Jan 11, 2020Updated 6 years ago
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆150Apr 25, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- ☆22Mar 24, 2025Updated last year
- TensorFlow Neural Machine Translation Tutorial☆17Sep 18, 2019Updated 6 years ago
- Concolic Exection Engine for Golang☆10May 16, 2018Updated 7 years ago
- LLM agent that autonomously hacks websites☆16May 30, 2024Updated last year
- ☆50May 1, 2026Updated last week
- A malicious KeePass plugin to exfiltrate the master key.☆16Oct 25, 2021Updated 4 years ago