owasp-dep-scan / depscan-bin
Binary builds for dep-scan - The Dependency Scanner
☆10Updated last year
Alternatives and similar repositories for depscan-bin:
Users that are interested in depscan-bin are comparing it to the libraries listed below
- A 'find' for S3 public buckets☆11Updated 8 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆25Updated last year
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆40Updated this week
- Maturity Model Collaborative project☆15Updated 2 years ago
- Go module that returns supported regions for a service or supported services for a region☆17Updated 11 months ago
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆19Updated 4 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 7 months ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- Dependency Combobulator☆93Updated last year
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 4 years ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 6 months ago
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- TypeScript/JavaScript client libraries for Sliver☆19Updated 2 years ago
- ☆15Updated 3 months ago
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- EPSS(Exploit Prediction Scoring System) API client☆18Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Updated last month
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.☆15Updated 2 years ago
- Analyze any snippet, file, or repository to detect possible security flaws such as secret in code, open source vulnerability, code securi…☆76Updated 8 months ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- Detection Rule License (DRL)☆17Updated 4 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆49Updated 3 weeks ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- ☆47Updated 10 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year