Application Security pipelines
☆51May 25, 2022Updated 3 years ago
Alternatives and similar repositories for DevSecOps-Pipelines
Users that are interested in DevSecOps-Pipelines are comparing it to the libraries listed below
Sorting:
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆19Jun 24, 2025Updated 8 months ago
- Automated tool for domains & Subdomains Gathering☆14Feb 26, 2026Updated last week
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated 2 years ago
- Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities datab…☆17May 18, 2022Updated 3 years ago
- Using AWS for GitHub Actions and various security features available through AWS Container Services like Amazon ECS, AWS Fargate, and Ama…☆16Mar 15, 2021Updated 4 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆18Nov 1, 2022Updated 3 years ago
- ☆20Oct 17, 2021Updated 4 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Scan A2A agents for potential threats and security issues☆123Feb 16, 2026Updated 3 weeks ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Jun 19, 2024Updated last year
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆29Jul 26, 2024Updated last year
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆18Sep 19, 2021Updated 4 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- ☆108Feb 14, 2026Updated 3 weeks ago
- Super organized and flexible script for sending phishing campaigns☆56Nov 28, 2021Updated 4 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆981Nov 27, 2023Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 9 months ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆77Feb 5, 2026Updated last month
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated last month
- Divide full port scan results and use it for targeted Nmap runs☆329Jul 1, 2024Updated last year
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Aug 1, 2022Updated 3 years ago
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- ☆186Jun 14, 2025Updated 8 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated last year
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 6 months ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- TEAM Mentor 3.x Released Code☆16Aug 5, 2016Updated 9 years ago
- Cheat sheets for commonly used tools by DevOps and SRE☆12Jan 3, 2024Updated 2 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆219Sep 4, 2025Updated 6 months ago
- ☆11Feb 28, 2022Updated 4 years ago
- Network penetration testing toolset wrapper☆81Jul 5, 2022Updated 3 years ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 10 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 7 months ago