Ultimate Benchmark for Container Image Scanners
☆13Oct 16, 2020Updated 5 years ago
Alternatives and similar repositories for UBCIS
Users that are interested in UBCIS are comparing it to the libraries listed below
Sorting:
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- ☆54Oct 2, 2025Updated 5 months ago
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Feb 21, 2026Updated last week
- Command line tool for working with Panther rules and policies☆48Feb 28, 2026Updated last week
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- ☆37Nov 9, 2025Updated 3 months ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- Python Faker provider for security related data☆41Aug 29, 2025Updated 6 months ago
- It is a RESTful API fuzzer.☆12Jun 20, 2024Updated last year
- PostgreSQL ansible role that adds four modules: pgsql_table, pgsql_row, pgsql_query, pgsql_command☆11Nov 5, 2019Updated 6 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Simplify and speed up common tasks in your ORT-based FOSS review workflows☆13Dec 19, 2025Updated 2 months ago
- Malware detection by entropy - ascii entropy and binary entropy☆10Mar 19, 2017Updated 8 years ago
- ☆15Feb 21, 2023Updated 3 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Converts JSON data to HTML table with collapsible details view for nested objects.☆14May 1, 2021Updated 4 years ago
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆13Mar 20, 2023Updated 2 years ago
- A demo about how to build a real compiler with LLVM libraries, write for the book https://github.com/tuoxie007/play_with_llvm☆10Apr 11, 2020Updated 5 years ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- Arch Linux dotfiles☆10Oct 31, 2024Updated last year
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Apr 13, 2016Updated 9 years ago
- Run nested VMs on cloud providers that don't support nested virtualization.☆17Dec 18, 2024Updated last year
- A GPT-based chatbot who knows the content of your Confluence wiki.☆14Apr 22, 2025Updated 10 months ago
- Repair docker-smell automatically☆13May 15, 2024Updated last year
- ☆26May 7, 2014Updated 11 years ago
- Cross-platform CLI tool to make remote command execution in AWS a breeze☆13Feb 25, 2023Updated 3 years ago
- practice-toy-wasm-vm-go☆11Apr 20, 2022Updated 3 years ago
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆12Jan 24, 2019Updated 7 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- A flat theme with transparent elements☆11May 22, 2017Updated 8 years ago
- Docker configuration for running Pi-Hole and Cloudflared on a Raspberry Pi for ultimate network DNS filtering and security☆11Jul 17, 2021Updated 4 years ago
- ☆12Aug 21, 2020Updated 5 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework, and other infrastructu…☆11Jan 13, 2026Updated last month
- Cookiecutter template for building consistent Terraform modules.☆12Nov 5, 2015Updated 10 years ago
- Labeled vulnerability-package match pairs used as ground truth to evaluate vulnerability scanners☆14Feb 26, 2026Updated last week
- Create sales demos on k8s/OpenShift with Ansible☆16Aug 8, 2024Updated last year