okta-graveyard / repo-supervisorLinks
Scan your code for security misconfiguration, search for passwords and secrets.
☆649Updated 2 years ago
Alternatives and similar repositories for repo-supervisor
Users that are interested in repo-supervisor are comparing it to the libraries listed below
Sorting:
- A tool to capture all the git secrets by leveraging multiple open source git searching tools☆1,134Updated 6 years ago
- Application Security Automation☆528Updated 2 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆484Updated 2 years ago
- A tool for identifying misconfigured CloudFront domains☆359Updated 5 years ago
- Git plugin that prevents sensitive data from being committed.☆315Updated 5 years ago
- Fully open-source SAST scanner supporting a range of languages and frameworks. Integrates with major CI pipelines and IDE such as Azure D…☆149Updated 5 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Updated 6 years ago
- An open source, online threat modelling tool from OWASP☆483Updated 3 months ago
- REST/JSON API to the Burp Suite security tool.☆561Updated 3 months ago
- a Damn Vulnerable Serverless Application☆543Updated 2 years ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆639Updated 4 years ago
- Exploits written by the Rhino Security Labs team☆1,081Updated 4 years ago
- An installable desktop variant of OWASP Threat Dragon☆592Updated last month
- A project security/vulnerability/risk scanning tool☆362Updated 4 years ago
- WeirdAAL (AWS Attack Library)☆826Updated 9 months ago
- A collection of AWS penetration testing junk☆1,208Updated 2 years ago
- Monitors Github for leaked secrets☆201Updated 11 months ago
- goSDL☆522Updated 2 years ago
- for AWS Security material☆250Updated 3 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆279Updated 3 weeks ago
- These are the regexes that power truffleHog☆218Updated 2 years ago
- Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace☆773Updated 8 months ago
- A simple web app that helps developers understand the ASVS requirements.☆159Updated 7 months ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Updated 7 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆327Updated last year
- threatspec - continuous threat modeling, through code☆368Updated 4 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆739Updated last year
- An application to assist in the organization and prioritization of software security activities.☆139Updated 4 years ago
- OWASP Serverless Top 10☆218Updated 4 years ago
- barq: The AWS Cloud Post Exploitation framework!☆385Updated 2 years ago