owasp-dep-scan / depscan-binLinks
Binary builds for dep-scan - The Dependency Scanner
☆10Updated last year
Alternatives and similar repositories for depscan-bin
Users that are interested in depscan-bin are comparing it to the libraries listed below
Sorting:
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆47Updated last week
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- Dependency Combobulator☆94Updated last year
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Updated last year
- A port scanner written in PowerShell☆13Updated 4 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 3 weeks ago
- ☆60Updated 2 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- CveXplore☆43Updated 3 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Golang installer for DefectDojo☆29Updated 10 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Faraday's Command Line Interface☆51Updated 3 months ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 4 months ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 6 months ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆37Updated 2 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 7 months ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 5 months ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Updated 3 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Updated 4 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆19Updated 2 years ago