Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior
☆32Feb 16, 2026Updated last week
Alternatives and similar repositories for caterpillar
Users that are interested in caterpillar are comparing it to the libraries listed below
Sorting:
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- A powerful, easy to use and intuitive way to create network analysis charts☆15Updated this week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- A Python script that saves your CrewAI agents crew output to a Notion Database☆14Feb 17, 2024Updated 2 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆60Feb 5, 2025Updated last year
- Interact with Windows RPC Services over SMB using go-smb☆11Nov 18, 2025Updated 3 months ago
- token exchange as a service☆11Updated this week
- Templates for testing Power BI reports for broken visuals using Azure DevOps, PowerShell, and Microsoft Playwright☆15Aug 26, 2025Updated 6 months ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Jan 11, 2026Updated last month
- ☆10Jan 14, 2015Updated 11 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- ☆11Oct 30, 2019Updated 6 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- ☆14Jan 8, 2026Updated last month
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆18Jun 9, 2023Updated 2 years ago
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Feb 12, 2026Updated 2 weeks ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆37Oct 23, 2025Updated 4 months ago
- Dataset fingerprinting for AIBOM☆15Feb 18, 2026Updated last week
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- Safety philosopy: example principles for an organization and management☆13Apr 14, 2025Updated 10 months ago
- ⛔️ DEPRECATED Schibsted Account SDK for Android☆14Oct 27, 2021Updated 4 years ago
- ☆32Updated this week
- A lightweight, Vercel AI SDK based coding agent library.☆37Feb 20, 2026Updated last week
- Chat app for Android that supports answers from multiple LLMs at once. Bring your own API key AI client. Supports OpenAI, Anthropic, Goog…☆12Oct 30, 2024Updated last year
- A GitHub Action that helps remove GHAS Licences☆12Jul 15, 2024Updated last year
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆18Sep 22, 2025Updated 5 months ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆18Feb 6, 2023Updated 3 years ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- ☆14Mar 8, 2023Updated 2 years ago
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆63Feb 5, 2026Updated 3 weeks ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago