Public OCI-Image (docker image) Security Checker
☆21Feb 16, 2026Updated last month
Alternatives and similar repositories for pisc
Users that are interested in pisc are comparing it to the libraries listed below
Sorting:
- It's my solution for bugbounty automation☆22Feb 24, 2026Updated 3 weeks ago
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- This project was moved to https://github.com/centosadmin/kube-security☆10Oct 24, 2019Updated 6 years ago
- A JSON Resume theme optimised for PDF output☆11Feb 14, 2026Updated last month
- Внедрение и эксплуатация PT Application Inspector. Подробнее: https://habr.com/ru/company/pt/blog/557142/☆38Aug 20, 2022Updated 3 years ago
- Find and remove metadata from MS doc or docx files in folder☆14Feb 2, 2026Updated last month
- Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094☆14Apr 6, 2024Updated last year
- TesserCap is a GUI based, point and shoot CAPTCHA analysis tool☆18Jul 8, 2012Updated 13 years ago
- Install and configure consul on your system.☆11Updated this week
- Optimized and Maintenance-free Kubernetes on Hetzner Cloud in one command! With Pulumi!☆20Nov 12, 2024Updated last year
- DevSecOps Assessment Framework☆129Feb 4, 2026Updated last month
- ☆33Aug 26, 2025Updated 6 months ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Russian translation of OWASP Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web applic…☆94Dec 3, 2022Updated 3 years ago
- ☆13Dec 30, 2024Updated last year
- Finding secrets in various (non-text) popular files.☆53Oct 21, 2025Updated 5 months ago
- ☆16Jan 23, 2026Updated last month
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆42Oct 30, 2024Updated last year
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆52Oct 11, 2025Updated 5 months ago
- ☆19Nov 14, 2022Updated 3 years ago
- An in-depth eBook on VictoriaMetrics and VictoriaLogs.☆63Jan 7, 2026Updated 2 months ago
- ☆21Sep 25, 2025Updated 5 months ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆26Jan 12, 2024Updated 2 years ago
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated last year
- ☆11Dec 22, 2023Updated 2 years ago
- Перевод BSIMM (https://www.bsimm.com) на русский язык☆23Dec 2, 2022Updated 3 years ago
- Jet Container Security Framework (JCSF)☆63Feb 13, 2026Updated last month
- A basic Redis leaderboard demo app written in Go☆12Aug 15, 2023Updated 2 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Jan 19, 2022Updated 4 years ago
- Go client library for OWASP Dependency-Track☆28Jan 2, 2026Updated 2 months ago
- An interactive Talos Linux installer☆186Apr 29, 2025Updated 10 months ago
- Generic cloud controller manager for hybrid deployments using Talos OS☆128Updated this week
- Crossplane provider for ProxmoxVE.☆20Dec 28, 2023Updated 2 years ago
- ☆11May 31, 2024Updated last year
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated 10 months ago