abhisek / supply-chain-security-gatewayView external linksLinks
Reference architecture and proof of concept implementation for supply chain security gateway
☆23Apr 1, 2023Updated 2 years ago
Alternatives and similar repositories for supply-chain-security-gateway
Users that are interested in supply-chain-security-gateway are comparing it to the libraries listed below
Sorting:
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.☆19Jan 8, 2023Updated 3 years ago
- Security scanning & static analysis tool☆93Oct 17, 2024Updated last year
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Jan 9, 2023Updated 3 years ago
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆27Sep 17, 2021Updated 4 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Sep 14, 2023Updated 2 years ago
- Dockercon 2016 Security Workshop☆35Aug 30, 2016Updated 9 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- This repository is to maintain all hypersign repositories and documentations☆10Mar 20, 2020Updated 5 years ago
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Profitable MT5 Expert Advisors☆21Updated this week
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A 64 bit OS☆10Nov 12, 2025Updated 3 months ago
- Example ASP.NET MVC website that handles 404 using <httpErrors> in web.config☆10Oct 14, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Dec 31, 2020Updated 5 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Oct 31, 2021Updated 4 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- ☆13Feb 26, 2021Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- ☆10Jun 13, 2024Updated last year
- ☆38Nov 27, 2020Updated 5 years ago
- OWASP Kubernetes Security Testing Guide☆41Dec 22, 2025Updated last month
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Jan 15, 2026Updated last month
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- ☆10Feb 16, 2021Updated 5 years ago
- A httpbin reimplementation in rust☆10Dec 29, 2018Updated 7 years ago
- 记录自己对《代码审计》的理解和总结,对危险函数的深入分析以及在p牛的博客和代码审计圈的收获☆11Feb 27, 2018Updated 7 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 9 years ago
- Exploit for Joomla JCK Editor 6.4.4 (CVE-2018-17254)☆10Apr 17, 2021Updated 4 years ago
- ☆10May 1, 2020Updated 5 years ago
- Python codes to install/configure to master/slave DNS bind and for add new zone or record☆10Apr 2, 2017Updated 8 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- All my POC related to malware development☆14May 13, 2024Updated last year