owasp-dep-scan / depscan-binLinks
Binary builds for dep-scan - The Dependency Scanner
☆10Updated last year
Alternatives and similar repositories for depscan-bin
Users that are interested in depscan-bin are comparing it to the libraries listed below
Sorting:
- Dependency Combobulator☆93Updated last year
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆46Updated this week
- Go module that returns supported regions for a service or supported services for a region☆17Updated last year
- Analyze any snippet, file, or repository to detect possible security flaws such as secret in code, open source vulnerability, code securi…☆79Updated last year
- Faraday's Command Line Interface☆51Updated 2 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- CveXplore☆42Updated 2 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- ☆60Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆37Updated last month
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆28Updated 6 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 6 months ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆59Updated 5 months ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆28Updated 11 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- A static website template for security pages.☆52Updated 4 months ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Data about all known supply-chain attacks through history☆62Updated 6 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Bypassing AWS WAF using a single ';'☆39Updated 7 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 4 months ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 4 months ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Updated 2 years ago