bitfront-se / bytesafe-ceLinks
Bytesafe Community Edition is a security platform that protects organizations from open source software supply chain attacks.
☆24Updated last year
Alternatives and similar repositories for bytesafe-ce
Users that are interested in bytesafe-ce are comparing it to the libraries listed below
Sorting:
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134Updated 9 months ago
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- Purple-team telemetry & simulation toolkit.☆107Updated last month
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Updated 6 months ago
- ☆38Updated this week
- redteamrecipe.com☆24Updated last year
- Source code and examples for Antignis☆44Updated 3 years ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆72Updated last month
- 🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷☆52Updated 11 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 9 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆101Updated last month
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- ☆18Updated last year
- Manage attack surface data on Elasticsearch☆24Updated 2 years ago
- Find what egress ports are allowed☆46Updated 2 months ago
- Open Source External Attack Surface Management☆49Updated last year
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆283Updated 2 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated 2 years ago
- Protection against HTML smuggling attacks.☆101Updated 6 months ago
- Remote command shell application written in C# targeting the .NET runtime.☆29Updated 2 weeks ago
- ☆27Updated 2 years ago
- A fork of the Go language with some tweaks☆55Updated last year
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆116Updated last month
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Updated 11 months ago