rbidou / pyraspLinks
PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (AWS Lambda, Azure and Google Cloud Functions) and MCP Servers (FastMCP)
☆32Updated last month
Alternatives and similar repositories for pyrasp
Users that are interested in pyrasp are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated last week
- Scapy hands-on☆34Updated last year
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆171Updated this week
- Search for known vulnerabilities in software using software titles or a CPE 2.3 string☆39Updated this week
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆186Updated 4 months ago
- Interactive, dynamic, and realistic LLM honeypots☆56Updated 5 months ago
- A curated list of argument injection vectors☆41Updated 6 months ago
- ☆111Updated 11 months ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆138Updated last month
- Volatility, on Docker 🐳☆34Updated 3 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated last month
- POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending library☆17Updated 10 months ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- xortigate-cve-2023-27997☆64Updated last year
- Cisco ASA Software and ASDM Security Research☆85Updated 2 years ago
- ☆41Updated this week
- Worlds First Public POC for CVE-2025-1974☆89Updated 4 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 9 months ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆142Updated last year
- CVEs and Techniques used PDF as an attack vector.☆93Updated 3 years ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- Secrets scanner that understands code☆149Updated 5 months ago
- ☆55Updated 9 months ago
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆133Updated last year
- Damn Vulnerable SCA Application☆39Updated 3 weeks ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 7 months ago
- PoC and Detection for CVE-2024-21626☆75Updated last year
- Everything related to YARA☆11Updated this week