OligoCyberSecurity / ShellTorchChecker
A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654
☆38Updated 9 months ago
Alternatives and similar repositories for ShellTorchChecker:
Users that are interested in ShellTorchChecker are comparing it to the libraries listed below
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆39Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 10 months ago
- WAF bypass PoC☆46Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated last month
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆80Updated last year
- Damn Vulnerable SCA Application☆30Updated last month
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆19Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆71Updated 11 months ago
- POC for CVE-2022-23648☆36Updated 2 years ago
- ☆31Updated 2 years ago
- PoC and Detection for CVE-2024-21626☆72Updated 11 months ago
- using ML models for red teaming☆39Updated last year
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆130Updated this week
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆17Updated 3 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆104Updated last month
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆67Updated 2 years ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆71Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆78Updated 6 months ago
- Curating Falco rules with MITRE ATT&CK Matrix☆77Updated 10 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated last year
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆41Updated 2 weeks ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆46Updated 3 months ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆58Updated 2 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- kubernetes rootkit☆31Updated last year
- PoC repository for CVE-2023-29007☆33Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆50Updated this week
- First iteration of ML based Feedback WAF☆58Updated 10 months ago