mmaitre314 / picklescanView external linksLinks
Security scanner detecting Python Pickle files performing suspicious actions
☆392Updated this week
Alternatives and similar repositories for picklescan
Users that are interested in picklescan are comparing it to the libraries listed below
Sorting:
- ☆183Updated this week
- Protection against Model Serialization Attacks☆645Nov 24, 2025Updated 2 months ago
- A Python pickling decompiler and static analyzer☆601Updated this week
- Pickle Scanner GUI☆216Dec 23, 2022Updated 3 years ago
- ☆11Dec 19, 2024Updated last year
- ☆86Feb 4, 2026Updated last week
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 6 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆59Nov 3, 2024Updated last year
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 10 months ago
- the LLM vulnerability scanner☆6,948Feb 5, 2026Updated last week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Feb 6, 2025Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Aug 8, 2025Updated 6 months ago
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆127Updated this week
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- A research project to add some brrrrrr to Burp☆197Feb 10, 2025Updated last year
- Security tool against dependency typosquatting attacks☆54Feb 9, 2026Updated last week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Data Backend server that uses eBPF to monitor network connections and provide real-time network analytics.☆18Aug 14, 2025Updated 6 months ago
- ☆14Jan 8, 2026Updated last month
- Bundle of security analysis scripts for keras tensorflow models☆15Apr 15, 2024Updated last year
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated last month
- Semgrep queries developed by Trail of Bits.☆474Nov 12, 2025Updated 3 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- Live validation proxy tool for testing web app vulnerabilities☆823Updated this week
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆13Jan 21, 2023Updated 3 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- Automated web vulnerability scanning with LLM agents☆446Jun 18, 2025Updated 7 months ago
- ☆362Jun 25, 2025Updated 7 months ago
- Collection of all previous 1337UP CTF challenges.☆79Jan 6, 2025Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- RCE PoC for Tensorflow using a malicious Lambda layer☆61Jul 30, 2025Updated 6 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 3 weeks ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Dec 7, 2025Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year