SecureStackCo / actions-log4j
A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
☆15Updated 2 years ago
Alternatives and similar repositories for actions-log4j:
Users that are interested in actions-log4j are comparing it to the libraries listed below
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 2 years ago
- A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition …☆22Updated 2 years ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆30Updated last year
- A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureS…☆24Updated last year
- All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!☆21Updated last year
- A GitHub Action that creates a SBOM from your application so you can meet compliance and security requirements. Add this to your dev, sta…☆25Updated last year
- A tools for JavaScript Recon☆21Updated 4 years ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆25Updated last year
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated 3 months ago
- A collection of one off hacks and simple scripts☆28Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆22Updated 7 months ago
- Vulnerability disclosure policies in the US Government's executive branch☆37Updated last year
- The current website at https://disclose.io.☆17Updated this week
- ☆15Updated 3 years ago
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆41Updated 2 weeks ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆51Updated 4 months ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- ☆16Updated 2 years ago
- Wordlists for Bug Bounty☆24Updated 5 years ago
- InfoSec OpenAI Examples☆19Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- ☆32Updated 3 weeks ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆23Updated 8 months ago
- Recon tool☆11Updated 3 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated last month
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- ☆23Updated 11 months ago
- OWASP ASVS Security Evaluation Templates with Nuclei☆27Updated last week