A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or artifact repositories.
☆69Nov 27, 2025Updated 3 months ago
Alternatives and similar repositories for MalifiScan
Users that are interested in MalifiScan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 9 months ago
- Security tool against dependency typosquatting attacks☆55Mar 17, 2026Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Data about all known supply-chain attacks through history☆64May 28, 2025Updated 9 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Sep 12, 2024Updated last year
- ☆163Updated this week
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆19Jul 25, 2025Updated 8 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 4 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆174Jan 9, 2026Updated 2 months ago
- SLSA level 3 action☆11Apr 26, 2024Updated last year
- ☆11Dec 10, 2023Updated 2 years ago
- Prevent merging of malicious code in pull requests☆253Jan 8, 2026Updated 2 months ago
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆85Mar 14, 2026Updated last week
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆139Jun 7, 2025Updated 9 months ago
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- ☆147Mar 16, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- AI Security Shared Responsibility Model☆90Sep 26, 2025Updated 5 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆186Feb 9, 2025Updated last year
- ☆22Mar 24, 2025Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆342Mar 16, 2026Updated last week
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- A low-cost approach to testing AI chat experiences and security concepts☆40Jul 23, 2025Updated 8 months ago
- Explore ThalesGroup's comprehensive framework for secure machine learning systems on this repository. Developed by Thales experts, this f…☆21Feb 1, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Security Content for the PEAK Threat Hunting Framework☆46Feb 15, 2024Updated 2 years ago
- ☆76Oct 18, 2025Updated 5 months ago
- read the docs version of risk management☆27Mar 6, 2023Updated 3 years ago
- SAMMY Open Source v2☆14Feb 6, 2025Updated last year
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.☆46Updated this week
- ☆42Nov 13, 2025Updated 4 months ago