Modular framework for file information extraction and dependency analysis to generate accurate SBOMs
☆40Apr 6, 2026Updated last week
Alternatives and similar repositories for Surfactant
Users that are interested in Surfactant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Oct 26, 2020Updated 5 years ago
- ☆14Mar 4, 2024Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆138Mar 10, 2026Updated last month
- ☆11May 12, 2022Updated 3 years ago
- Linux agent used to submit realtime SBOMs and dependency usage information to EdgeBit☆15Jan 24, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- Repository for on-going work as part of the SBOM for AI Tiger Team effort.☆43Jul 28, 2025Updated 8 months ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- SBOM Search - Context aware search in SBOM repositories☆32Nov 24, 2025Updated 4 months ago
- OSS License Open Data☆12Jun 28, 2019Updated 6 years ago
- SBOM generator for Debian-based distributions☆27Updated this week
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- Build, edit, validate, and export CycloneDX BOMs through an intuitive browser-based interface☆19Updated this week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- OpenSSF Endusers Working Group☆28Mar 21, 2024Updated 2 years ago
- Tool for visualizing the Open SSF Scorecard Api data in a human friendly way☆19Nov 27, 2025Updated 4 months ago
- Vuln Disclosure WG's new SIG☆11Jan 2, 2024Updated 2 years ago
- Example containerd client in Go; used for CNCF/KubeCon talk☆21Oct 22, 2020Updated 5 years ago
- Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed☆15Oct 8, 2019Updated 6 years ago
- a practical example of Shamir's secret sharing scheme☆19Sep 25, 2024Updated last year
- Windows CLI clipping tool☆24Dec 29, 2022Updated 3 years ago
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆16Nov 18, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Command line client for splitting secrets using Shamir's Secret Sharing Algorithm☆16Apr 2, 2017Updated 9 years ago
- PyCes (Python Code Scanner) - Enhanced Security Static Analysis Tool for Python☆11Apr 18, 2019Updated 6 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- ☆43Mar 9, 2016Updated 10 years ago
- a small cmd line tool to align words in a sequence of lines in a smart way☆13Apr 6, 2026Updated last week
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- Analysis of what technologies power federal .gov websites - 2021 edition.☆12Mar 5, 2023Updated 3 years ago
- A simple UNIX Shell commands emulator that works within Vim☆17Jul 15, 2015Updated 10 years ago
- A repo to conduct vulnerability enrichment.☆750Apr 8, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- OSCAR main source repository.☆16Sep 25, 2025Updated 6 months ago
- Yet another lightweight version for K8S, and even lighter than K3S.☆11Mar 12, 2020Updated 6 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Vulnerability Management with SBOM☆20Updated this week
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- QSOS repository (Method, Formats, Tools)☆27Feb 12, 2024Updated 2 years ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Mar 27, 2026Updated 2 weeks ago