ecomtech-oss / piscLinks
Public OCI-Image (docker image) Security Checker
☆16Updated 3 weeks ago
Alternatives and similar repositories for pisc
Users that are interested in pisc are comparing it to the libraries listed below
Sorting:
- It's my solution for bugbounty automation☆18Updated 2 months ago
- DevSecOps Assessment Framework☆100Updated this week
- Secrets scanner that understands code☆188Updated last year
- 🧰 Multi Tool Kubernetes Pentest Image☆240Updated 3 months ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆45Updated 2 years ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆36Updated 8 months ago
- Check bitrix vulnerabilities☆75Updated last year
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 5 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆229Updated 5 months ago
- SneakPeeker is a tool for finding and removing Canary tokens.☆14Updated 6 months ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆161Updated last week
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆111Updated 6 months ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆205Updated 4 months ago
- Secrets scanner that understands code☆148Updated 4 months ago
- HTTP redirection service designed to help bypass SSRF filters. Integrated with Burp Suite.☆41Updated 2 weeks ago
- ☆10Updated last year
- https://t.me/+V6d8SvKVFXo2MjIy☆44Updated 2 years ago
- Modern web-based distributed hashcracking solution, built on hashcat☆141Updated this week
- Внедрение и эксплуатация PT Application Inspector. Подробнее: https://habr.com/ru/company/pt/blog/557142/☆34Updated 2 years ago
- A monster cheatsheet on MITM attacks☆360Updated last month
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆141Updated 3 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆161Updated 7 months ago
- Light-weight web security scanner☆150Updated 4 months ago
- VSFI Bashwars tasks☆5Updated 6 months ago
- 1C RAS Offensive Security Tool☆26Updated last year
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆20Updated 7 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated last month
- The Most Advanced Client-Side Prototype Pollution Scanner☆226Updated 3 weeks ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆125Updated last week
- A recon tool that uses ML to predict subdomains. Then returns those that resolve.☆101Updated 2 months ago