Production‑ready SDLC pipelines for every language, every stage, and every DevOps ecosystem.
☆21Feb 28, 2026Updated last week
Alternatives and similar repositories for pipelines
Users that are interested in pipelines are comparing it to the libraries listed below
Sorting:
- The VulnCheck Github Action☆13Feb 25, 2026Updated last week
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- An application for retrieving and viewing success metrics from Sonatype Nexus IQ☆17Feb 14, 2025Updated last year
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Dast tool☆13Jul 28, 2023Updated 2 years ago
- Raf Scanner IDE☆12Apr 14, 2023Updated 2 years ago
- ☆45Updated this week
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- This is the GitHub repo of the OpenChain SBOM Study Group☆12Feb 18, 2026Updated 2 weeks ago
- ☆12Nov 2, 2022Updated 3 years ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- Ph33r No Number - OSINT Script☆15Sep 25, 2020Updated 5 years ago
- Zero-knowledge secrets infrastructure built for AI agents to operate, not just consume.☆45Updated this week
- Cryptography for Pentesters Course [Arabic]☆26Feb 3, 2026Updated last month
- ☆19Jul 17, 2025Updated 7 months ago
- ☆18May 18, 2025Updated 9 months ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- Deep Learning Framework from Scratch | Youtube Tutorial☆13Mar 3, 2020Updated 6 years ago
- OWASP Foundation Web Respository☆17Jun 1, 2022Updated 3 years ago
- My solutions to the Using Python to Access Web Data course on Coursera☆18Dec 7, 2015Updated 10 years ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆19Jul 2, 2025Updated 8 months ago
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆19Oct 18, 2024Updated last year
- Advanced Cluster Security for Kubernetes tutorial☆14Apr 22, 2024Updated last year
- Kubernetes Dashboard iOS App☆19Mar 5, 2024Updated 2 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- A proof-of-concept SLSA provenance generator for Jenkins☆24Jul 29, 2024Updated last year
- Intentionally Vulnerable Demo App: .NET MVC, WCF, WebAPI, Web Forms☆21Feb 10, 2024Updated 2 years ago
- Clone all bitbucket repositories from all your workspaces☆27Dec 31, 2025Updated 2 months ago
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆26Dec 17, 2024Updated last year
- SLSA implementation of Community Specification governance☆24Jan 15, 2026Updated last month
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- ☆28Oct 2, 2025Updated 5 months ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- Перевод BSIMM (https://www.bsimm.com) на русский язык☆23Dec 2, 2022Updated 3 years ago
- ☆23Sep 21, 2022Updated 3 years ago
- Fork Threat Modeling Platform - Community☆27Oct 10, 2025Updated 4 months ago
- Hackintosh (OpenCore) Dell Inspiron 15 5559 i7 6500u | Tested on Bigsur, Catalina☆21Jun 18, 2024Updated last year