OligoCyberSecurity / ShellTorchChecker
A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654
☆38Updated 10 months ago
Alternatives and similar repositories for ShellTorchChecker:
Users that are interested in ShellTorchChecker are comparing it to the libraries listed below
- WAF bypass PoC☆46Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated this week
- ☆31Updated 2 years ago
- using ML models for red teaming☆42Updated last year
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆17Updated 3 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆39Updated 2 years ago
- First iteration of ML based Feedback WAF☆58Updated 11 months ago
- PoC and Detection for CVE-2024-21626☆73Updated last year
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆58Updated 10 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆131Updated last year
- Rules for Bearer SAST☆26Updated last week
- AutoSpear☆60Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Static Token And Credential Scanner☆96Updated last year
- A security-first linter for code that shouldn't need linting☆16Updated last year
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- OSS-Fuzz vulnerabilities for OSV.☆150Updated this week
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated 4 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆109Updated last week
- Damn Vulnerable SCA Application☆30Updated 3 months ago
- Manager of third-party sources of Semgrep rules 🗂☆79Updated 7 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Updated last year
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆71Updated last year
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆139Updated this week
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆46Updated 2 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆80Updated last year
- ☆12Updated 3 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆91Updated last month
- Secure Jupyter Notebooks and Experimentation Environment☆69Updated last month