faloker / purifyLinks
All-in-one tool for managing vulnerability reports from AppSec pipelines
☆108Updated 3 years ago
Alternatives and similar repositories for purify
Users that are interested in purify are comparing it to the libraries listed below
Sorting:
- Monitoring GitHub for sensitive data shared publicly☆66Updated 4 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 6 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Updated 6 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆94Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆66Updated 2 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 5 years ago
- Real Time Threat Monitoring Tool☆114Updated 3 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆87Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- ☆51Updated 3 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Updated 5 years ago
- AWS Security Checks☆40Updated 8 years ago
- AWS S3 Sensitive Data Search☆36Updated 4 years ago
- Dependency Combobulator☆95Updated 2 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆166Updated this week
- A Burp plugin to export findings to DefectDojo☆31Updated 2 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 6 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 7 months ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- Static security checker for Dockerfiles☆102Updated last week
- A Report Generation Tool for Security Assessment☆65Updated 7 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago