A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition analysis).
☆22Apr 9, 2022Updated 4 years ago
Alternatives and similar repositories for actions-code
Users that are interested in actions-code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆14Apr 9, 2022Updated 4 years ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆31Jun 7, 2023Updated 2 years ago
- A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureS…☆27Jun 7, 2023Updated 2 years ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Aug 26, 2022Updated 3 years ago
- A GitHub Action that creates a SBOM from your application so you can meet compliance and security requirements. Add this to your dev, sta…☆25Jun 7, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!☆21Jun 7, 2023Updated 2 years ago
- A simple nodejs microservice which works as an authentication reverse-proxy for other services.☆12Feb 2, 2016Updated 10 years ago
- Bridge Javascript and Crystal via the JavaScriptCore engine. Goals are ease of bridging and feature parody, while maintaining the feel of…☆17Jan 28, 2017Updated 9 years ago
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆20Jul 25, 2025Updated 9 months ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- asyncio-based Python 3.5+ client to `obs-websocket` plugin for OBS Studio☆34Jul 26, 2018Updated 7 years ago
- Tracking DJI No Fly Zones☆12Jul 16, 2024Updated last year
- GitHub action to generate a CycloneDX SBOM for Node.js☆22Jul 11, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A tool to build a graph from a codebase☆14Feb 19, 2025Updated last year
- Domain Specific Languages for Financial Systems Webpage☆12Mar 7, 2021Updated 5 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- Static Trace-Based Deadlock Analysis for Synchronous Mini-Go☆19Apr 3, 2017Updated 9 years ago
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆32Oct 20, 2024Updated last year
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- A GPT agent with a Text Interface tool☆15Feb 10, 2026Updated 3 months ago
- Discord HTTP requests interception POC, including backup codes requests, for educational purposes only.☆24Jul 11, 2024Updated last year
- ☆11Aug 12, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A list of Information Security firms operating in th Asia-Pacific region, and where student intake opportunities can be found.☆24Oct 30, 2020Updated 5 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆27Dec 31, 2019Updated 6 years ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- ❄️ Research project for SubFinder core API V2☆34Dec 30, 2018Updated 7 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- ☆88May 4, 2026Updated 2 weeks ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆20Mar 27, 2023Updated 3 years ago
- ☆10Apr 20, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Sample project demonstrating use of an Xcode Source Editor Extension to format Swift code☆19Mar 27, 2019Updated 7 years ago
- BYOVD Technique Example using viragt64 driver☆82Jul 25, 2024Updated last year
- GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)☆16May 9, 2024Updated 2 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆82Mar 7, 2026Updated 2 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago