A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
☆27Jun 7, 2023Updated 2 years ago
Alternatives and similar repositories for actions-exposure
Users that are interested in actions-exposure are comparing it to the libraries listed below
Sorting:
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Aug 26, 2022Updated 3 years ago
- All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!☆21Jun 7, 2023Updated 2 years ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Mar 24, 2022Updated 3 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- AWS audits, without screenshots☆28Feb 9, 2026Updated 2 weeks ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Smart weather dashboard. Integrates with OpenWeatherMaps and Ecobee. Designed to run on RaspberryPi.☆15Aug 19, 2023Updated 2 years ago
- ☆13Jan 2, 2024Updated 2 years ago
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆18Jul 25, 2025Updated 7 months ago
- ☆10May 6, 2023Updated 2 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- A prototype of an Edge worker that implements the Client Side A/B testing spec.☆16Jan 29, 2024Updated 2 years ago
- Search engin prototype for wikipedia articles☆10Jul 31, 2014Updated 11 years ago
- ☆12Jan 17, 2026Updated last month
- ☆16Feb 19, 2026Updated last week
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Sep 2, 2025Updated 5 months ago
- ☆12Mar 17, 2025Updated 11 months ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- ☆11Jun 12, 2023Updated 2 years ago
- The pattern matching swiss knife☆16Oct 28, 2019Updated 6 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated last year
- Open source incident management and response platform.☆14Mar 16, 2018Updated 7 years ago
- Library for reading KeePass files and decrypt the passwords within it☆14Jun 25, 2024Updated last year
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆17Jul 11, 2025Updated 7 months ago
- Workspace is a powerful application designed to install and manage all your repositories in your chosen destination.☆16Jul 5, 2025Updated 7 months ago
- Protecting Windows-Server against RDP (Remote-Desktop) attacks (Ban after X attempts, with report function for AbuseIPDB.com)☆14Oct 19, 2018Updated 7 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- ☆24Updated this week
- Sigma to Wazuh rule converter☆18Sep 28, 2025Updated 4 months ago