Public OCI-Image (docker image) Security Checker
☆20Feb 16, 2026Updated last week
Alternatives and similar repositories for pisc
Users that are interested in pisc are comparing it to the libraries listed below
Sorting:
- It's my solution for bugbounty automation☆22Updated this week
- Examples of different vulnerabilities, in a variety of languages, shapes and sizes.☆29Mar 7, 2024Updated last year
- Makita lockout flag reset tool based on https://github.com/mnh-jansson/open-battery-information .☆16Nov 13, 2025Updated 3 months ago
- Jet Container Security Framework (JCSF)☆63Feb 13, 2026Updated 2 weeks ago
- Finding secrets in various (non-text) popular files.☆52Oct 21, 2025Updated 4 months ago
- ☆11May 31, 2024Updated last year
- ☆13Sep 15, 2024Updated last year
- Install and configure consul on your system.☆11Nov 6, 2025Updated 3 months ago
- ☆16Jan 23, 2026Updated last month
- A collection of expired domains previously blocked by Russia's Roskomnadzor, now available for free registration. Reclaim the web! 🌐🔓☆11Feb 20, 2026Updated last week
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆52Oct 11, 2025Updated 4 months ago
- Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094☆14Apr 6, 2024Updated last year
- Traefik plugin for blocking traffic from the Tor network☆14Jan 2, 2022Updated 4 years ago
- Metric collector for PostgreSQL☆14Feb 15, 2023Updated 3 years ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 9 years ago
- ☆11Dec 22, 2023Updated 2 years ago
- Шаблон микросервиса на Golang с чистой архитектурой, gRPC & HTTP API, аутентификацией и многим другим! 🚀☆10Apr 6, 2024Updated last year
- Scrape Twitter for long hashtags that could be used as passwords☆10Jan 4, 2017Updated 9 years ago
- Sorting YAML and JSON files☆20Updated this week
- A basic Redis leaderboard demo app written in Go☆12Aug 15, 2023Updated 2 years ago
- ☆39Sep 8, 2025Updated 5 months ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Codeaudit - Modern Python source code security analyzer based on distrust.☆27Feb 19, 2026Updated last week
- ☆26Feb 10, 2026Updated 2 weeks ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- A hands‑on, lab‑based toolkit for securing containerised environments. Progress from core audit techniques to advanced AI‑enabled runtime…☆29Feb 2, 2026Updated last month
- revert klipper and moonraker to working versions from qidi’s repo, and install the latest working version of fluidd☆21Mar 3, 2025Updated 11 months ago
- Resources to learn about Insecure Deserialization☆17Jul 12, 2024Updated last year
- ☆21Sep 25, 2025Updated 5 months ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- ☆15Jun 15, 2022Updated 3 years ago
- King's Bounty 3 (extended JavaScript fan remake of original 1990 game)☆16Mar 2, 2024Updated last year
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated 10 months ago
- ☆13Nov 15, 2025Updated 3 months ago
- ☆19Oct 3, 2023Updated 2 years ago
- HOLM (Hashes.Org Left Manager)☆12Feb 23, 2016Updated 10 years ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- Commands for hardening Ubuntu 22.04 LTS☆21Dec 17, 2024Updated last year