owasp-dep-scan / depscan-binLinks
Binary builds for dep-scan - The Dependency Scanner
☆10Updated last year
Alternatives and similar repositories for depscan-bin
Users that are interested in depscan-bin are comparing it to the libraries listed below
Sorting:
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆47Updated this week
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Go module that returns supported regions for a service or supported services for a region☆18Updated last week
- Dependency Combobulator☆94Updated last year
- Faraday's Command Line Interface☆51Updated 3 months ago
- sudo-parser is a tool to audit complex sudoers files☆18Updated 3 years ago
- Golang installer for DefectDojo☆29Updated 10 months ago
- ☆63Updated 2 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- whois command implemented by golang with awesome whois servers list☆64Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 3 weeks ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Updated last year
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 4 months ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆14Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆60Updated 2 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Updated last year
- Bypassing AWS WAF using a single ';'☆39Updated 7 years ago
- Docker container escape enumeration tool.☆11Updated 4 years ago
- Fast and passive subdomain enumeration.☆18Updated 3 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated 2 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated 2 years ago
- LDAP Swiss Army Knife☆50Updated 2 years ago