crashappsec / ocularLinks
software asset scanning orchestration system
☆26Updated 2 weeks ago
Alternatives and similar repositories for ocular
Users that are interested in ocular are comparing it to the libraries listed below
Sorting:
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆30Updated this week
- ☆39Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- ☆112Updated 2 years ago
- Data about all known supply-chain attacks through history☆58Updated 3 months ago
- InfoSec OpenAI Examples☆19Updated last year
- Scan your account for the use of untrusted AMIs☆28Updated this week
- A GitHub Actions Supply Chain CTF / Goat☆24Updated this week
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated 8 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 9 months ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se …☆85Updated this week
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆40Updated 8 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- ☆12Updated 4 years ago
- ☆57Updated 2 years ago
- boostsecurityio/lotp☆132Updated 4 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 7 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆29Updated 5 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆108Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆74Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated 4 months ago
- ☆50Updated last year
- Demonstrates how a malicious dependency could negatively impact the build output.☆24Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 11 months ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆18Updated 4 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆124Updated 6 months ago
- OWASP Top 10 Infrastructure Security Risks☆38Updated 2 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆65Updated 3 months ago