Prevent merging of malicious code in pull requests
☆253Jan 8, 2026Updated last month
Alternatives and similar repositories for PRevent
Users that are interested in PRevent are comparing it to the libraries listed below
Sorting:
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆143Feb 24, 2025Updated last year
- Security tool against dependency typosquatting attacks☆54Updated this week
- Bitor Scanning Software☆454Nov 7, 2025Updated 3 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated last month
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆462Updated this week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆898Updated this week
- From Patch to PoC☆29Nov 19, 2025Updated 3 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆70Nov 27, 2025Updated 3 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated last month
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Jan 11, 2026Updated last month
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated last month
- Search engine for CTF writeups with instant results.☆152Mar 6, 2025Updated 11 months ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆28Oct 13, 2024Updated last year
- Mitigate security concerns of Dependency Confusion supply chain security risks☆51Jan 15, 2026Updated last month
- 🔎 Static code analysis engine to find security issues in code.☆2,159Feb 22, 2026Updated last week
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- ☆114Jun 8, 2023Updated 2 years ago
- ☆14Jan 8, 2026Updated last month
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- Make your GenAI Apps Safe & Secure Test & harden your system prompt☆635Feb 16, 2026Updated last week
- Threat-hunting tool for Linux☆1,040Feb 16, 2026Updated last week
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆215Updated this week
- Validate the isolation posture of your container environment.☆312Feb 11, 2026Updated 2 weeks ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆186Feb 9, 2025Updated last year
- Dependency Combobulator☆95Jan 10, 2024Updated 2 years ago
- RSS feeds in public.☆15Jan 29, 2026Updated last month