Public OCI-Image (docker image) Security Checker
☆21Feb 16, 2026Updated 2 months ago
Alternatives and similar repositories for pisc
Users that are interested in pisc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It's my solution for bugbounty automation☆24Apr 13, 2026Updated 2 weeks ago
- Examples of different vulnerabilities, in a variety of languages, shapes and sizes.☆29Mar 7, 2024Updated 2 years ago
- Azure DevOps Server development system segmentation best practices☆11Sep 20, 2022Updated 3 years ago
- A JSON Resume theme optimised for PDF output☆11Apr 16, 2026Updated 2 weeks ago
- Внедрение и эксплуатация PT Application Inspector. Подробнее: https://habr.com/ru/company/pt/blog/557142/☆38Aug 20, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Metric collector for PostgreSQL☆14Feb 15, 2023Updated 3 years ago
- Find and remove metadata from MS doc or docx files in folder☆14Feb 2, 2026Updated 2 months ago
- Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094☆14Apr 6, 2024Updated 2 years ago
- TesserCap is a GUI based, point and shoot CAPTCHA analysis tool☆18Jul 8, 2012Updated 13 years ago
- Multipurpose scenarios framework☆18Jan 1, 2019Updated 7 years ago
- Optimized and Maintenance-free Kubernetes on Hetzner Cloud in one command! With Pulumi!☆20Nov 12, 2024Updated last year
- Helpers for Proxmox Virtual Enviroment☆11Feb 10, 2017Updated 9 years ago
- DevSecOps Assessment Framework☆134Feb 4, 2026Updated 2 months ago
- ☆33Aug 26, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Use any Terraform provider with Pulumi☆23Mar 3, 2026Updated last month
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Hybrid memory system for OpenClaw using Graphiti temporal knowledge graph☆68Feb 8, 2026Updated 2 months ago
- Finding secrets in various (non-text) popular files.☆55Oct 21, 2025Updated 6 months ago
- ☆13Sep 15, 2024Updated last year
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- Coloured, dark and white icon sets for GNOME/XFCE/LXDE - by alecive.deviantart.com☆11May 14, 2016Updated 9 years ago
- ☆19Nov 14, 2022Updated 3 years ago
- ☆21Sep 25, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated last year
- Jet Container Security Framework (JCSF)☆66Feb 13, 2026Updated 2 months ago
- Перевод BSIMM (https://www.bsimm.com) на русский язык☆23Dec 2, 2022Updated 3 years ago
- An in-depth eBook on VictoriaMetrics and VictoriaLogs.☆66Jan 7, 2026Updated 3 months ago
- Authentik Server for traefik proxy☆14Oct 5, 2023Updated 2 years ago
- kubernetes rootkit☆34Dec 18, 2023Updated 2 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Jan 19, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆41Nov 16, 2025Updated 5 months ago
- Create a DEB file for Joplin☆15Jan 16, 2026Updated 3 months ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- Container image with malware and crypto miner for testing purposes☆48Updated this week
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- ☆14Apr 24, 2023Updated 3 years ago