faloker / purifyLinks
All-in-one tool for managing vulnerability reports from AppSec pipelines
☆108Updated 3 years ago
Alternatives and similar repositories for purify
Users that are interested in purify are comparing it to the libraries listed below
Sorting:
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 6 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Updated 6 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆94Updated last year
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆87Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆66Updated 2 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 5 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- ☆51Updated 3 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 6 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆49Updated 6 years ago
- Dependency Combobulator☆95Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 4 years ago
- AWS S3 Sensitive Data Search☆36Updated 3 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Updated 5 years ago
- A Burp plugin to export findings to DefectDojo☆29Updated 2 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- Security checks for your researches☆34Updated 5 years ago
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- Security conferences talks☆25Updated 5 years ago