owasp-dep-scan / depscan-binLinks
Binary builds for dep-scan - The Dependency Scanner
☆10Updated last year
Alternatives and similar repositories for depscan-bin
Users that are interested in depscan-bin are comparing it to the libraries listed below
Sorting:
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆44Updated this week
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆57Updated 10 months ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Updated last year
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- Dependency Combobulator☆93Updated last year
- Faraday's Command Line Interface☆51Updated 2 months ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆28Updated 11 months ago
- A static website template for security pages.☆52Updated 3 months ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆84Updated last week
- Analyze any snippet, file, or repository to detect possible security flaws such as secret in code, open source vulnerability, code securi…☆79Updated last year
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆27Updated 5 months ago
- Go module that returns supported regions for a service or supported services for a region☆16Updated last year
- A command based package for simple display of statistics☆25Updated 11 months ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 8 years ago
- Notus is a vulnerability scanner for creating results from local security checks☆60Updated this week
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Updated 6 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 years ago
- whois command implemented by golang with awesome whois servers list☆65Updated 2 years ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆74Updated 5 months ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆15Updated 2 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆74Updated last year
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆17Updated 2 years ago
- CVE database☆21Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 5 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 3 months ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago