A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or artifact repositories.
☆69Nov 27, 2025Updated 5 months ago
Alternatives and similar repositories for MalifiScan
Users that are interested in MalifiScan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆76Sep 13, 2025Updated 7 months ago
- Security tool against dependency typosquatting attacks☆56Apr 27, 2026Updated last week
- BlueSky OSINT Tool☆15Dec 10, 2024Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Apr 18, 2026Updated 2 weeks ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- ☆98Apr 14, 2026Updated 3 weeks ago
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆117Mar 14, 2026Updated last month
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated 3 weeks ago
- Data about all known supply-chain attacks through history☆66May 28, 2025Updated 11 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆45Sep 12, 2024Updated last year
- ☆164Mar 20, 2026Updated last month
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆20Jul 25, 2025Updated 9 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated last month
- ☆18Feb 2, 2026Updated 3 months ago
- ☆10Mar 25, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated last month
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆179Jan 9, 2026Updated 3 months ago
- SLSA level 3 action☆11Apr 26, 2024Updated 2 years ago
- ☆11Dec 10, 2023Updated 2 years ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆49Apr 28, 2026Updated last week
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆139Jun 7, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- AI Security Shared Responsibility Model☆91Sep 26, 2025Updated 7 months ago
- ☆154Updated this week
- ☆13Aug 31, 2020Updated 5 years ago
- Create and Validate JWT Token using Java JJWT (HMAC and RSA)☆10May 30, 2020Updated 5 years ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆187Feb 9, 2025Updated last year
- ☆22Mar 24, 2025Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆174Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ZAP scripts to implement ASVS L1 checking☆17Apr 28, 2022Updated 4 years ago
- An index of publicly available and open-source threat detection rulesets.☆134Apr 17, 2025Updated last year
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆419Apr 24, 2026Updated last week
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- ☆76Oct 18, 2025Updated 6 months ago
- Security Content for the PEAK Threat Hunting Framework☆47Feb 15, 2024Updated 2 years ago
- A low-cost approach to testing AI chat experiences and security concepts☆40Jul 23, 2025Updated 9 months ago