Curated list of security tools
☆68Jan 17, 2024Updated 2 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS device…☆17Sep 15, 2025Updated 6 months ago
- my nuclei templates #new☆10Jun 24, 2024Updated last year
- Automated threat intel feed parsing and consolidation💻👾🤖☆41Mar 24, 2026Updated last week
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Nov 30, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12May 20, 2022Updated 3 years ago
- ☆30Mar 3, 2021Updated 5 years ago
- ☆18Jul 30, 2024Updated last year
- Kubernetes and Knative pipeline demo using Tekton☆12Jun 25, 2019Updated 6 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This operator provides facility to sync decryption keys required for Encrypted Container Images.☆17Updated this week
- Genrates python dependency graph☆22Aug 10, 2018Updated 7 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 4 months ago
- Burp Intruder File Payload Generator☆18Oct 27, 2019Updated 6 years ago
- AI-powered SAST accelerator built to speed up secure development.☆44Updated this week
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- The ultimate Java library for Troy Hunt's ';-- Have I Been Pwned (v3).☆14Feb 21, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Look into EDR events from network☆25Nov 20, 2025Updated 4 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Install and run kali, blackarch, parrot and more... inside the termux udocker container | no root☆14Jul 25, 2025Updated 8 months ago
- Example of orchestrating dependent Databricks jobs using Airflow☆11Dec 19, 2019Updated 6 years ago
- Vault Plugin: Google Cloud Platform CA Service☆17Jul 20, 2021Updated 4 years ago
- An eBPF-based behavioral monitor for AI coding agents.☆116Updated this week
- Creates secured box for accessing internal networks☆14Apr 5, 2019Updated 6 years ago
- A custom Keycloak attribute mapper that fetches a user's SSH keys from the github REST API.☆21Feb 12, 2024Updated 2 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆53Jan 30, 2026Updated 2 months ago
- The Coherence Python Client allows Python applications to act as cache clients to an Oracle Coherence cluster using gRPC as the network t…☆12Updated this week
- ☆17Jan 2, 2020Updated 6 years ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Keycloak event listener provider implementation to send events either to a HTTP REST endpoint or to a JMS topic☆18Mar 24, 2018Updated 8 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago