ecomtech-oss / pisc
Public OCI-Image (docker image) Security Checker
☆14Updated last week
Alternatives and similar repositories for pisc:
Users that are interested in pisc are comparing it to the libraries listed below
- SneakPeeker is a tool for finding and removing Canary tokens.☆14Updated last month
- DevSecOps Assessment Framework☆78Updated last month
- Secrets scanner that understands code☆188Updated last year
- 🧰 Multi Tool Kubernetes Pentest Image☆222Updated 5 months ago
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆42Updated 2 weeks ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆30Updated 3 months ago
- 1C RAS Offensive Security Tool☆24Updated last year
- Check bitrix vulnerabilities☆69Updated last year
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆43Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆212Updated 2 weeks ago
- This script Crawl the website and find the urls that contains html forms.☆71Updated 8 months ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆178Updated last month
- Внедрение и эксплуатация PT Application Inspector. Подробнее: https://habr.com/ru/company/pt/blog/557142/☆34Updated 2 years ago
- ☆42Updated last year
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆32Updated last month
- Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)☆88Updated 4 years ago
- ☆10Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆114Updated 6 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 3 weeks ago
- A monster cheatsheet on MITM attacks☆324Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆51Updated last year
- https://t.me/+V6d8SvKVFXo2MjIy☆44Updated 2 years ago
- Some nuclei templates for pentest CMS Bitrix☆25Updated last week
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆45Updated 6 months ago
- Application Security pipelines☆50Updated 2 years ago
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆197Updated 6 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆80Updated 2 months ago
- ✨ Fully autonomous AI Agents system capable of performing complex penetration testing tasks☆75Updated 2 weeks ago
- ☆303Updated this week
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆152Updated 2 months ago