ZupIT / horusec-platform
Horusec Platform is a set of web services that integrate with the Horusec CLI to facilitate the visualization and management of found vulnerabilities.
☆63Updated last week
Alternatives and similar repositories for horusec-platform:
Users that are interested in horusec-platform are comparing it to the libraries listed below
- Awesome resources about Security in Kubernetes☆41Updated 2 years ago
- Horusec analysis engine☆22Updated this week
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated last week
- ☆139Updated last week
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆46Updated 2 months ago
- Dependency Combobulator☆92Updated last year
- WAF bypass PoC☆46Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- OWASP ASVS Security Evaluation Templates with Nuclei☆29Updated this week
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆103Updated 4 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 7 months ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆25Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆69Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- Analyze any snippet, file, or repository to detect possible security flaws such as secret in code, open source vulnerability, code securi…☆76Updated 6 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated last year
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated last month
- Protect against subdomain takeover☆93Updated 9 months ago
- ☆175Updated 3 months ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆52Updated 2 years ago
- Rules for Bearer SAST☆26Updated last week
- ⚡️ Multiple target ZAP Scanning☆104Updated last year
- ☆31Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆37Updated 3 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- ☆12Updated 3 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year