ecomtech-oss / pisc
Public OCI-Image (docker image) Security Checker
☆16Updated 2 months ago
Alternatives and similar repositories for pisc
Users that are interested in pisc are comparing it to the libraries listed below
Sorting:
- It's my solution for bugbounty automation☆18Updated last month
- DevSecOps Assessment Framework☆85Updated 4 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆230Updated 3 weeks ago
- Secrets scanner that understands code☆189Updated last year
- Jet Container Security Framework (JCSF)☆28Updated 2 weeks ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆31Updated 6 months ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆45Updated 2 years ago
- Secrets scanner that understands code☆141Updated 2 months ago
- Check bitrix vulnerabilities☆74Updated last year
- 1C RAS Offensive Security Tool☆25Updated last year
- Внедрение и эксплуатация PT Application Inspector. Подробнее: https://habr.com/ru/company/pt/blog/557142/☆34Updated 2 years ago
- SneakPeeker is a tool for finding and removing Canary tokens.☆14Updated 4 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆226Updated 3 months ago
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆49Updated 3 weeks ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 3 months ago
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆43Updated 2 months ago
- A monster cheatsheet on MITM attacks☆349Updated last month
- A recon tool that uses ML to predict subdomains. Then returns those that resolve.☆86Updated 3 weeks ago
- Some nuclei templates for pentest CMS Bitrix☆27Updated 3 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆87Updated 5 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆126Updated last month
- ☆42Updated last year
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated 8 months ago
- HTTP redirection service designed to help bypass SSRF filters. Integrated with Burp Suite.☆35Updated last month
- Modern web-based distributed hashcracking solution, built on hashcat☆138Updated last week
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆20Updated 5 months ago
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆47Updated 3 months ago
- https://t.me/+V6d8SvKVFXo2MjIy☆44Updated 2 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆118Updated last year
- Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)☆89Updated 4 years ago