SecureStackCo / actions-all-in-one
All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!
☆21Updated last year
Alternatives and similar repositories for actions-all-in-one:
Users that are interested in actions-all-in-one are comparing it to the libraries listed below
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆15Updated 2 years ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆30Updated last year
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 2 years ago
- A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition …☆22Updated 2 years ago
- A GitHub Action that creates a SBOM from your application so you can meet compliance and security requirements. Add this to your dev, sta…☆25Updated last year
- A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureS…☆24Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Source code for the Binaries of OWASP WrongSecrets☆11Updated last week
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- ☆14Updated 2 years ago
- The Secure Coding Framework☆21Updated 4 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆37Updated 3 years ago
- A curated list of GPT agents for cybersecurity☆8Updated 6 months ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆18Updated 3 years ago
- OWASP Foundation Web Respository☆10Updated last year
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆15Updated 2 months ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆16Updated 8 months ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Updated 2 years ago
- In this repository, I will collect quick and simple code examples that use Python to automate various #osint tasks.☆56Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- A fun POC that is built to understand AI security agents.☆29Updated 3 months ago
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆17Updated last year
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆28Updated last year
- OWASP Foundation Web Respository☆18Updated 3 weeks ago
- Automatic Secret Finder - JWT, Access Token, API keys... Based on m4ll0k/SecretFinder☆29Updated 2 years ago
- Recon (Whois)☆15Updated last year
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆36Updated last week
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- AWS Security Tool☆29Updated last year