SecureStackCo / actions-log4jLinks
A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
☆14Updated 3 years ago
Alternatives and similar repositories for actions-log4j
Users that are interested in actions-log4j are comparing it to the libraries listed below
Sorting:
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 3 years ago
- A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition …☆22Updated 3 years ago
- All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!☆21Updated 2 years ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆31Updated 2 years ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Updated 2 years ago
- A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureS…☆27Updated 2 years ago
- Dependency Combobulator☆95Updated 2 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆29Updated 8 months ago
- Go module that returns supported regions for a service or supported services for a region☆18Updated last month
- WAF bypass PoC☆50Updated 2 years ago
- OWASP ASVS Security Evaluation Templates with Nuclei☆42Updated 2 months ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Updated 2 weeks ago
- Simple Chatbot for testing AI Red Team tooling☆16Updated 11 months ago
- Vulnerability disclosure policies in the US Government's executive branch☆38Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Updated 2 years ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆76Updated 8 months ago
- Manage attack surface data on Elasticsearch☆24Updated 2 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 10 months ago
- ☆25Updated last year
- ☆24Updated 2 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆20Updated 2 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆19Updated 5 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- Simple website to guess API Key / OAuth Token☆48Updated 3 years ago
- Scanner to identify dangling DNS records and subdomain takeovers☆49Updated last year
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15Updated 8 months ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 5 years ago