☆43Aug 27, 2025Updated 6 months ago
Alternatives and similar repositories for Take_Home_Exercise-
Users that are interested in Take_Home_Exercise- are comparing it to the libraries listed below
Sorting:
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Dataset fingerprinting for AIBOM☆15Feb 18, 2026Updated 2 weeks ago
- ☆15Apr 13, 2021Updated 4 years ago
- ☆36Apr 29, 2025Updated 10 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Short deep dive into Threat Hunting on AWS☆17Oct 15, 2023Updated 2 years ago
- 🛡️ High-performance WAF & CDN detection tool with effectiveness testing suite. Identify protection layers (Cloudflare, Akamai, AWS) and …☆109Updated this week
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Feb 4, 2025Updated last year
- Performing secure code review with LLMs (and vibe coding IDEs)☆36Aug 5, 2025Updated 7 months ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- ☆25Jun 27, 2024Updated last year
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 10 months ago
- ☆22Dec 21, 2021Updated 4 years ago
- Everything Application Security☆27Mar 3, 2026Updated last week
- The Seiso standard python cookiecutter template☆14Updated this week
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆38Feb 16, 2026Updated 3 weeks ago
- Cybersecurity Architects Handbook, published by Packt☆27Mar 27, 2024Updated last year
- A comprehensive database of Model Context Protocol vulnerabilities, security research, and exploits☆34Feb 16, 2026Updated 3 weeks ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆26Nov 23, 2017Updated 8 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 11 months ago
- ☆25Mar 28, 2018Updated 7 years ago
- ☆31Oct 28, 2024Updated last year
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆82Feb 25, 2026Updated last week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆72Sep 17, 2021Updated 4 years ago
- ☆64Jun 9, 2025Updated 9 months ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆105Dec 3, 2025Updated 3 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆84Dec 3, 2025Updated 3 months ago
- Labs for Threat Modelling training delivered by ControlPlane☆35Feb 24, 2026Updated last week
- Scan your account for the use of untrusted AMIs☆32Updated this week
- This service provides authenticated access to a static website hosted in an s3 bucket.☆33Feb 25, 2023Updated 3 years ago
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- ☆15Mar 21, 2025Updated 11 months ago
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆90Updated this week
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago