ecomtech-oss / piscLinks
Public OCI-Image (docker image) Security Checker
☆17Updated 2 months ago
Alternatives and similar repositories for pisc
Users that are interested in pisc are comparing it to the libraries listed below
Sorting:
- It's my solution for bugbounty automation☆19Updated 5 months ago
- DevSecOps Assessment Framework☆110Updated 2 weeks ago
- 🧰 Multi Tool Kubernetes Pentest Image☆245Updated last month
- Jet Container Security Framework (JCSF)☆48Updated 3 months ago
- Secrets scanner that understands code☆188Updated last year
- SneakPeeker is a tool for finding and removing Canary tokens.☆14Updated 9 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆173Updated 8 months ago
- https://t.me/+V6d8SvKVFXo2MjIy☆42Updated 2 years ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆163Updated last week
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆38Updated 11 months ago
- OPA policies for securing Docker API☆11Updated 2 years ago
- Check bitrix vulnerabilities☆85Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆189Updated last month
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 8 months ago
- Внедрение и эксплуатация PT Application Inspector. Подробнее: https://habr.com/ru/company/pt/blog/557142/☆36Updated 3 years ago
- Secrets scanner that understands code☆154Updated 7 months ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- Репозиторий с материалами для развития в Bug Bounty☆11Updated last year
- Modern web-based distributed hashcracking solution, built on hashcat☆146Updated this week
- ☆42Updated last year
- A monster cheatsheet on MITM attacks☆365Updated 4 months ago
- Awesome DevSecOps на русском языке☆319Updated 2 years ago
- 1C RAS Offensive Security Tool☆27Updated 2 years ago
- Light-weight web security scanner☆151Updated 7 months ago
- ☆47Updated last year
- ⛅️🔐 Security Requirements for Yandex.Cloud configuration: IAM, network access, key management, Kubernetes, audit logs.☆40Updated 4 years ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆210Updated 7 months ago
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆118Updated 9 months ago
- ☆76Updated 3 years ago