okta-graveyard / repo-supervisorLinks
Scan your code for security misconfiguration, search for passwords and secrets.
☆649Updated 2 years ago
Alternatives and similar repositories for repo-supervisor
Users that are interested in repo-supervisor are comparing it to the libraries listed below
Sorting:
- A tool to capture all the git secrets by leveraging multiple open source git searching tools☆1,137Updated 6 years ago
- Application Security Automation☆527Updated last year
- Git plugin that prevents sensitive data from being committed.☆313Updated 4 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆478Updated 2 years ago
- A tool for identifying misconfigured CloudFront domains☆359Updated 5 years ago
- Fully open-source SAST scanner supporting a range of languages and frameworks. Integrates with major CI pipelines and IDE such as Azure D…☆149Updated 4 years ago
- These are the regexes that power truffleHog☆218Updated 2 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆181Updated 6 years ago
- An open source, online threat modelling tool from OWASP☆486Updated last month
- REST/JSON API to the Burp Suite security tool.☆563Updated last month
- Monitors Github for leaked secrets☆200Updated 9 months ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆642Updated 4 years ago
- WeirdAAL (AWS Attack Library)☆818Updated 7 months ago
- Exploits written by the Rhino Security Labs team☆1,083Updated 4 years ago
- Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace☆773Updated 6 months ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆738Updated last year
- goSDL☆522Updated 2 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Updated 6 years ago
- ☆107Updated 2 years ago
- A simple tool for interacting with OWASP ZAP from the commandline.☆242Updated 2 years ago
- a Damn Vulnerable Serverless Application☆541Updated last year
- An installable desktop variant of OWASP Threat Dragon☆592Updated last week
- The DevSecOps toolset for REST APIs☆274Updated 2 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆282Updated last week
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆483Updated 2 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆639Updated 5 years ago
- CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys☆1,166Updated 2 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Updated 5 years ago
- A collection of AWS penetration testing junk☆1,205Updated last year
- a ruggedization framework that embodies the principle "be mean to your code"☆992Updated 3 years ago