A high entropy string plugin for OpenStack's bandit project
☆48Oct 8, 2021Updated 4 years ago
Alternatives and similar repositories for bandit-high-entropy-string
Users that are interested in bandit-high-entropy-string are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python AST-based static analyzer from OpenStack Security Group☆1,161Apr 19, 2019Updated 7 years ago
- A Flake8 plugin for checking executable permissions and shebangs.☆20Updated this week
- SublimeLinter plugin for Python, using bandit☆12Apr 24, 2025Updated last year
- 📢 Capture exceptions in django management commands into Sentry by Raven☆26Jul 13, 2017Updated 8 years ago
- Sphinx directive to add unselectable prompt☆52Apr 23, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- UNMAINTAINED: Django/Jinja2 l10n extract/merge commands and things (Tower replacement)☆14May 11, 2022Updated 3 years ago
- CORS implementation for Python☆18May 13, 2015Updated 10 years ago
- a language extension library☆14Feb 17, 2025Updated last year
- setup.py cheatsheet☆16Sep 13, 2014Updated 11 years ago
- A wiki engine entirely managed with text files stored in a revision control system.☆20Dec 3, 2022Updated 3 years ago
- Fitbit to SQLite database☆12Feb 8, 2021Updated 5 years ago
- A tool for discovering subdomains via third party services and wordlists.☆74Apr 14, 2016Updated 10 years ago
- A front-end agnostic toolbox for autocompletion fields☆18Aug 20, 2024Updated last year
- django-login-canary is a reusable Django application to notify users upon successful and failed logins☆14Dec 3, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- TextExpander Snippets for generating fake data for common roles: email, name, telephone, postcodes, etc☆18Nov 27, 2009Updated 16 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…