☆51Feb 10, 2026Updated 3 months ago
Alternatives and similar repositories for devsecops-policy-scanner
Users that are interested in devsecops-policy-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆53Dec 14, 2025Updated 5 months ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆21May 26, 2025Updated 11 months ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated 2 years ago
- MetaHarvest - is designed to extract rich, structured metadata from any given list of websites. It taps into web page contents to retriev…☆31Sep 16, 2025Updated 8 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆15Nov 18, 2020Updated 5 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- A powerful Burp Suite extension that imports Postman collections☆31Aug 1, 2025Updated 9 months ago
- Automatically password protect (with encryption) certain pages on GitHub Pages/Jekyll sites using PageCrypt.☆30Feb 1, 2025Updated last year
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 10 months ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆29Oct 19, 2023Updated 2 years ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆90Nov 25, 2025Updated 5 months ago
- A list of the best cybersecurity research related blogs.☆33May 26, 2025Updated 11 months ago
- Beginner Road map that paves the way for your journey into the captivating world of cyber security based on job roles.☆25Jan 27, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Creation of multiple Malware tools consisting of evasion, enumeration and exploitation☆102Updated this week
- Download all videos from YouTube playlist with 4 threading to download super fast☆25Mar 30, 2024Updated 2 years ago
- Inject RDPThief into memory with PowerShell.☆66Jan 21, 2025Updated last year
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆79Dec 2, 2024Updated last year
- Advanced APK analysis tool with intelligent caching, pattern matching, and comprehensive security vulnerability detection☆84Oct 21, 2025Updated 7 months ago
- Transition form local file inclusion attacks to remote code exection☆69Aug 26, 2020Updated 5 years ago
- My notes containing the Certified Red Team Professional Course☆73Sep 7, 2024Updated last year
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆94Aug 9, 2024Updated last year
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆71Jun 5, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆99Mar 4, 2025Updated last year
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆82Aug 20, 2023Updated 2 years ago
- generate payloads that force authentication against an attacker machine☆120Nov 6, 2022Updated 3 years ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆85Sep 24, 2024Updated last year
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆190Mar 11, 2026Updated 2 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆153May 3, 2024Updated 2 years ago
- This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_…☆169Updated this week
- A fast, minimalistic scanner for time-based SQL injection (SQLi) detection – built in Go.☆144May 7, 2025Updated last year
- A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, em…☆387Sep 1, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A list of all Active Directory machines from HackTheBox☆254Apr 26, 2026Updated 3 weeks ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆175Jul 16, 2023Updated 2 years ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆154Sep 4, 2025Updated 8 months ago
- Python script to decrypt passwords stored by mRemoteNG☆180Jul 6, 2023Updated 2 years ago
- Enumerate / Dump Docker Registry☆183Apr 10, 2024Updated 2 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆272Mar 2, 2026Updated 2 months ago
- PNPT Exam Preparation - TCM Security☆171Jul 25, 2021Updated 4 years ago