SecureStackCo / actions-log4jLinks
A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
☆15Updated 3 years ago
Alternatives and similar repositories for actions-log4j
Users that are interested in actions-log4j are comparing it to the libraries listed below
Sorting:
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 2 years ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆31Updated 2 years ago
- A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition …☆22Updated 3 years ago
- A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureS…☆26Updated 2 years ago
- All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!☆21Updated 2 years ago
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆20Updated last year
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆38Updated 10 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆8Updated last year
- Go module that returns supported regions for a service or supported services for a region☆16Updated last year
- OWASP ASVS Security Evaluation Templates with Nuclei☆36Updated last month
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆24Updated 2 months ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆71Updated last month
- Dependency Combobulator☆93Updated last year
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- Simple website to guess API Key / OAuth Token☆48Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Updated last year
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆32Updated 2 weeks ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.☆15Updated 3 years ago
- ☆12Updated 3 years ago
- AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications …☆29Updated 6 months ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆38Updated 3 years ago
- A repository of the 10 million live most popular websites☆40Updated 2 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆24Updated last month
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- S3 bucket enumerator☆30Updated 6 years ago