UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.
☆36Sep 4, 2022Updated 3 years ago
Alternatives and similar repositories for unisbom
Users that are interested in unisbom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HPSTR Grav Skeleton☆11Jan 18, 2025Updated last year
- Lexmark CVE-2023-26067☆28Aug 8, 2023Updated 2 years ago
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆333Sep 9, 2024Updated last year
- Oh My ZSH Kustomize Plugin☆15May 28, 2025Updated 9 months ago
- 💣 REST and SOAP web API fuzzer☆25May 17, 2016Updated 9 years ago
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- Store the ATD/openapi/protobuf/... interfaces between semgrep components☆18Mar 13, 2026Updated last week
- OWASP IoT Security Verification Standard (ISVS)☆149Oct 6, 2025Updated 5 months ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 4 years ago
- ☆27Feb 9, 2023Updated 3 years ago
- A crossplatform mDNS enumeration tool.☆363Sep 25, 2022Updated 3 years ago
- Backup scripts I use on my drives.☆25Nov 26, 2017Updated 8 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- NAT Slipstream attack code samples☆48Jun 28, 2021Updated 4 years ago
- Support & Utilities container Images built and used by SIGHUP☆11Feb 17, 2026Updated last month
- A specification for a jsonld nodejs stream☆15Oct 13, 2018Updated 7 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- Academie en ligne de CyberDefense pour la jeunesse du continent Africain.☆18Oct 6, 2020Updated 5 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 11 months ago
- ☆10Jun 29, 2022Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Python modules which provide a suite of useful utilities for CTFs☆11Nov 1, 2019Updated 6 years ago
- writeups for Capture The Flag Competitions☆16May 31, 2022Updated 3 years ago
- A crossplane function that runs cue scripts that adhere to a specific interface☆12Apr 27, 2024Updated last year
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- Using Ansible and Nginx to programmatically obtain Let's Encrypt SSL certificates☆12Oct 22, 2019Updated 6 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- AWS Module: additional components for EKS-based clusters on AWS☆14Feb 19, 2026Updated last month
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 3 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- ☆11Jul 23, 2024Updated last year
- ☆15Nov 8, 2019Updated 6 years ago
- Intentionaly very vulnerable API with bonus bad coding practices☆51Nov 15, 2025Updated 4 months ago
- ☆12Feb 19, 2026Updated last month
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago