rios0rios0 / pipelinesView external linksLinks
Production‑ready SDLC pipelines for every language, every stage, and every DevOps ecosystem.
☆20Updated this week
Alternatives and similar repositories for pipelines
Users that are interested in pipelines are comparing it to the libraries listed below
Sorting:
- An application for retrieving and viewing success metrics from Sonatype Nexus IQ☆17Feb 14, 2025Updated last year
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- The VulnCheck Github Action☆13Mar 28, 2025Updated 10 months ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- Dast tool☆13Jul 28, 2023Updated 2 years ago
- This is the GitHub repo of the OpenChain SBOM Study Group☆12Aug 6, 2025Updated 6 months ago
- ☆12Nov 2, 2022Updated 3 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Cryptography for Pentesters Course [Arabic]☆24Feb 3, 2026Updated last week
- Deep Learning Framework from Scratch | Youtube Tutorial☆13Mar 3, 2020Updated 5 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- A security-first linter for code that shouldn't need linting☆17Sep 12, 2023Updated 2 years ago
- ☆19Jul 17, 2025Updated 6 months ago
- OWASP Foundation Web Respository☆16Jun 1, 2022Updated 3 years ago
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆19Oct 18, 2024Updated last year
- Advanced Cluster Security for Kubernetes tutorial☆14Apr 22, 2024Updated last year
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- My solutions to the Using Python to Access Web Data course on Coursera☆18Dec 7, 2015Updated 10 years ago
- Kubernetes Dashboard iOS App☆19Mar 5, 2024Updated last year
- A proof-of-concept SLSA provenance generator for Jenkins☆24Jul 29, 2024Updated last year
- ☆24Nov 8, 2024Updated last year
- Clone all bitbucket repositories from all your workspaces☆26Dec 31, 2025Updated last month
- Solution for the Practice Round of Google Hash Code 2017 - Score: 749873☆13Feb 21, 2017Updated 8 years ago
- Automate the process of compacting the WSL virtual disk☆17Nov 27, 2020Updated 5 years ago
- pwk notes and scripts☆14Apr 29, 2015Updated 10 years ago
- Перевод BSIMM (https://www.bsimm.com) на русский язык☆23Dec 2, 2022Updated 3 years ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- ☆28Oct 2, 2025Updated 4 months ago
- Hackintosh (OpenCore) Dell Inspiron 15 5559 i7 6500u | Tested on Bigsur, Catalina☆21Jun 18, 2024Updated last year
- ☆23Sep 21, 2022Updated 3 years ago
- Fork Threat Modeling Platform - Community☆27Oct 10, 2025Updated 4 months ago
- Deprecated; please use fcli instead☆27Aug 13, 2025Updated 6 months ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Aug 8, 2020Updated 5 years ago
- Learn AngularJS in this step-by-step series. The goal is to build something real while discussing the technology behind the code.☆23Sep 23, 2016Updated 9 years ago
- Do you want to learn AI Security but don't know where to start ? Take a look at this map.☆29Apr 23, 2024Updated last year
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25May 5, 2022Updated 3 years ago
- Software Security course☆23Mar 6, 2015Updated 10 years ago
- ☆28Jun 27, 2020Updated 5 years ago