A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
☆27Jun 7, 2023Updated 2 years ago
Alternatives and similar repositories for actions-exposure
Users that are interested in actions-exposure are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition …☆22Apr 9, 2022Updated 4 years ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Aug 26, 2022Updated 3 years ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆31Jun 7, 2023Updated 2 years ago
- A GitHub Action that creates a SBOM from your application so you can meet compliance and security requirements. Add this to your dev, sta…☆25Jun 7, 2023Updated 2 years ago
- A simple nodejs microservice which works as an authentication reverse-proxy for other services.☆12Feb 2, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆20Jul 25, 2025Updated 9 months ago
- ☆12Mar 9, 2026Updated last month
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆21Mar 24, 2022Updated 4 years ago
- Python library for grayhatwarfare.com with small hacks☆16Aug 5, 2020Updated 5 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- asyncio-based Python 3.5+ client to `obs-websocket` plugin for OBS Studio☆34Jul 26, 2018Updated 7 years ago
- Guidelines on writing effective Google Cloud samples.☆13Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A platform-agnostic event-based window management library for .NET (Windows/Win32 implementation)☆13Mar 14, 2026Updated last month
- Secure cursor rules following the R.A.I.L.G.U.A.R.D Framework☆13Apr 21, 2025Updated last year
- AI Bill of Materials through source code scanning☆59Apr 22, 2026Updated last week
- An API to allow developers transfer the ability to use restricted APIs to any target window in the frame tree.☆16Jul 9, 2024Updated last year
- CTF website frontend for SecGen☆21Aug 11, 2017Updated 8 years ago
- Search engin prototype for wikipedia articles☆10Jul 31, 2014Updated 11 years ago
- AWS audits, without screenshots☆36Apr 22, 2026Updated last week
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- A python network scanner using scapy☆25Mar 21, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A list of Information Security firms operating in th Asia-Pacific region, and where student intake opportunities can be found.☆24Oct 30, 2020Updated 5 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- Qovery Migration AI Agent to Automate and Ease the Migration From Cloud Providers with Qovery☆25Apr 13, 2026Updated 2 weeks ago
- `COEP: x-bikeshed-credentialless-unless-cors`☆29Jun 13, 2022Updated 3 years ago
- Personal blog about cyber security and challenges☆20Mar 25, 2026Updated last month
- DITA Open Toolkit plug-in registry☆16Feb 20, 2026Updated 2 months ago
- An example Universal React Application using Express, Redux and Webpack.☆12Jan 23, 2020Updated 6 years ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 4 months ago
- Effort to list and aggregate known malicious Google Chrome Extension IDs☆61Nov 26, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Replaced by Cloud9 V3! https:/github.com/c9/core☆24Jun 7, 2016Updated 9 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆41Nov 21, 2021Updated 4 years ago
- An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.☆27Updated this week
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆34Nov 24, 2022Updated 3 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Library for reading KeePass files and decrypt the passwords within it☆14Jun 25, 2024Updated last year
- Security Rules & Workflows for the new wave of AI Development.☆46Aug 7, 2025Updated 8 months ago