SecureStackCo / actions-all-in-oneLinks
All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!
☆21Updated 2 years ago
Alternatives and similar repositories for actions-all-in-one
Users that are interested in actions-all-in-one are comparing it to the libraries listed below
Sorting:
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 2 years ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Updated 2 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆30Updated 7 months ago
- A Content Discovery and Development Platform. Empowering Cybersecurity, AI, Marketing, and Finance professionals and researchers to disco…☆47Updated this week
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆39Updated 3 years ago
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆38Updated 4 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆17Updated last week
- ATHI — An AI Threat Modeling Framework for Policymakers☆53Updated last year
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆14Updated 4 months ago
- aws cli pentesting/red team snippets☆32Updated last year
- AWS Security Tool☆30Updated last year
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Updated 3 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆28Updated 2 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆20Updated last year
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆27Updated 2 years ago
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆15Updated 3 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Updated last year
- A fun POC that is built to understand AI security agents.☆32Updated 7 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 2 months ago
- Subdomain enumeration using Cloudflare's scanning tool.☆46Updated 3 weeks ago
- A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition …☆22Updated 3 years ago
- 📚A curated list of product security resources.☆20Updated last month
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- ☆91Updated 2 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆50Updated this week
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆20Updated 2 years ago
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆27Updated 2 years ago
- Go module that returns supported regions for a service or supported services for a region☆16Updated last year