☆57Jun 17, 2020Updated 5 years ago
Alternatives and similar repositories for scorebot
Users that are interested in scorebot are comparing it to the libraries listed below
Sorting:
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Security Payload Unit Test Repository (SPUTR)☆87Feb 18, 2026Updated last week
- Code samples that correctly check the remote server's SSL certificate☆24Feb 22, 2016Updated 10 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- The Marinus NodeJS UI and the supporting Python analysis scripts.☆62Feb 15, 2026Updated 2 weeks ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- Assorted tools for security-related task for git repositories☆58Apr 10, 2022Updated 3 years ago
- DevOps course, Google Cloud Platform☆13Oct 15, 2017Updated 8 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- ☆14Apr 23, 2019Updated 6 years ago
- Use burp's JS static code analysis on code from your local system.☆43Dec 22, 2016Updated 9 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- fiaas-deploy-daemon is the core component of the FIAAS platform☆56Feb 20, 2026Updated last week
- barq: The AWS Cloud Post Exploitation framework!☆388Nov 19, 2022Updated 3 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- A pytest-inspired, DAST framework, capable of identifying vulnerabilities in a distributed, micro-service ecosystem through chaos enginee…☆226May 9, 2024Updated last year
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- Unit testing framework for test driven security of AWS, GCP, Heroku and more.☆108Jan 22, 2026Updated last month
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Poor mans Splunk. Command line real time statistics while tailing logs☆32Dec 29, 2025Updated 2 months ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- ☆69Jul 18, 2025Updated 7 months ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- An open source, online threat modelling tool from OWASP☆484Jul 18, 2025Updated 7 months ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 9 months ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Marking instances dirty since 2018☆47Apr 25, 2019Updated 6 years ago