Reference architecture and proof of concept implementation for supply chain security gateway
☆23Apr 1, 2023Updated 2 years ago
Alternatives and similar repositories for supply-chain-security-gateway
Users that are interested in supply-chain-security-gateway are comparing it to the libraries listed below
Sorting:
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.☆19Jan 8, 2023Updated 3 years ago
- Security scanning & static analysis tool☆93Oct 17, 2024Updated last year
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆27Sep 17, 2021Updated 4 years ago
- ☆22Aug 16, 2023Updated 2 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Sep 14, 2023Updated 2 years ago
- Rules for detecting security issues in Angular 1.x☆30Apr 20, 2023Updated 2 years ago
- Dockercon 2016 Security Workshop☆35Aug 30, 2016Updated 9 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- A curated list of different pentesting resources☆30Feb 26, 2022Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- ☆10Jun 13, 2024Updated last year
- ☆11Dec 5, 2020Updated 5 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- ☆38Nov 27, 2020Updated 5 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Jan 15, 2026Updated last month
- ☆18Sep 9, 2025Updated 6 months ago
- WEB渗透测试数据库☆10Sep 20, 2016Updated 9 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Monitor your domains for newly issued certificates and alert to Slack in near-realtime☆10Aug 29, 2022Updated 3 years ago
- ☆13Jan 6, 2022Updated 4 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- ☆13Nov 8, 2017Updated 8 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- ☆15Jul 3, 2025Updated 8 months ago
- my templates for the nuclei engine to find security vulnerabilities.☆10Aug 19, 2024Updated last year
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- How to Get Started into Bug Bounty Complete Beginner Guide ( Part 1 Web Pentesting ) Hello guys, after a lot of requests and questions o…☆11May 30, 2021Updated 4 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Python script to create simple posters, using simple phrases and background images.☆11Mar 19, 2015Updated 10 years ago