Secure GitHub actions with 1 line of code
☆37Mar 10, 2025Updated 11 months ago
Alternatives and similar repositories for bolt
Users that are interested in bolt are comparing it to the libraries listed below
Sorting:
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Mar 2, 2026Updated last week
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Nov 12, 2024Updated last year
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Python script to create simple posters, using simple phrases and background images.☆11Mar 19, 2015Updated 10 years ago
- Python Certificate Transparency client☆11Feb 8, 2015Updated 11 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- ☆11Dec 26, 2023Updated 2 years ago
- mini wiki software in golang☆21Nov 16, 2018Updated 7 years ago
- Python codes to install/configure to master/slave DNS bind and for add new zone or record☆10Apr 2, 2017Updated 8 years ago
- A httpbin reimplementation in rust☆10Dec 29, 2018Updated 7 years ago
- ☆14Aug 2, 2018Updated 7 years ago
- Cross-platform CLI tool to make remote command execution in AWS a breeze☆13Feb 25, 2023Updated 3 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Supply Chain Query Tool☆13May 25, 2022Updated 3 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- ☆10Apr 1, 2022Updated 3 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Cross-Origin Resource Sharing Example☆33Feb 21, 2010Updated 16 years ago
- Caching layer for botocore / boto3 SDK.☆12Mar 13, 2024Updated last year
- Script to identify new host using the subjectAltName (Subject Alternate Name) extension of a x509 HTTP TLS certificate.☆12Dec 25, 2020Updated 5 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Troubleshooting Linux 2019☆12Mar 2, 2023Updated 3 years ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- Tourist is an HTTP API around Microsoft Playwright for CTF challenges☆13Jun 25, 2025Updated 8 months ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Feb 9, 2019Updated 7 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- Demo repository for all the different ways to do eBPF Tracing☆18Feb 9, 2026Updated last month
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- AWS Temporary Permissions Bot☆16Nov 30, 2023Updated 2 years ago
- Short deep dive into Threat Hunting on AWS☆17Oct 15, 2023Updated 2 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 2 years ago
- Workshop for Day Zero - AWS☆13May 30, 2019Updated 6 years ago
- Scapy hands-on at #GreHack17☆17Nov 14, 2017Updated 8 years ago
- ☆14Oct 3, 2018Updated 7 years ago