Compare vulnerability scanners results (to make them better!)
☆27Feb 20, 2026Updated last week
Alternatives and similar repositories for yardstick
Users that are interested in yardstick are comparing it to the libraries listed below
Sorting:
- Labeled vulnerability-package match pairs used as ground truth to evaluate vulnerability scanners☆14Feb 13, 2026Updated 2 weeks ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆110Feb 20, 2026Updated last week
- ☆17Updated this week
- Repository of SBOMs generated by the syft SBOM generator tool, against a list of popular dockerhub container images.☆19Oct 9, 2024Updated last year
- punchout takes the suck out of logging time on JIRA☆26Updated this week
- A license scanner for container images and filesystems.☆143Updated this week
- Grype vulnerability check plugin for Visual Studio Code☆24Dec 11, 2024Updated last year
- The XSS Hunter service - a portable version of XSSHunter.com☆27Nov 13, 2017Updated 8 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- Resources for running in person and virtual workshops.☆15Nov 18, 2025Updated 3 months ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- A standalone gRPC service that implements the Talos Security Service protocol☆57Feb 13, 2026Updated 2 weeks ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- ☆17Feb 20, 2026Updated last week
- OPI5 open micro desk design.☆13Mar 6, 2023Updated 2 years ago
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆32Oct 10, 2024Updated last year
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- A tutorial on how to create and deploy a VPN server on GCP, followed by deploying a private k8s cluster which connects only through the V…☆11Sep 4, 2021Updated 4 years ago
- ☆12Jul 8, 2025Updated 7 months ago
- ☆12Jul 23, 2025Updated 7 months ago
- A Common Controller Core Library for orchestrating an F5 BIG-IP☆12Dec 22, 2025Updated 2 months ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Jul 7, 2020Updated 5 years ago
- Aqua Security's open source community☆48Apr 10, 2024Updated last year
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- Utility functions for dbt projects running on Athena☆12Mar 25, 2025Updated 11 months ago
- OpenPGP in Python using Sequoia PGP☆18Updated this week
- Automatically generate tests for your website by using LLM models☆17Aug 7, 2023Updated 2 years ago
- A system to track the status of healthcare providers during and after a disaster.☆13Mar 4, 2023Updated 2 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated last month
- Repository for the Oulu University Security Engineering course.☆14Sep 12, 2025Updated 5 months ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- ☆15Jul 2, 2024Updated last year
- CloudGraph managed policy packs☆10May 17, 2023Updated 2 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- ☆36Nov 9, 2025Updated 3 months ago