schibsted / artishockView external linksLinks
A tool to investigate Dependency Confusion in Artifactory
☆24May 15, 2025Updated 8 months ago
Alternatives and similar repositories for artishock
Users that are interested in artishock are comparing it to the libraries listed below
Sorting:
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Code samples that correctly check the remote server's SSL certificate☆24Feb 22, 2016Updated 9 years ago
- Implementation of ECDAA☆23Nov 10, 2017Updated 8 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago
- Simple warpper for AFL cgi binary fuzzing☆30Apr 24, 2016Updated 9 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- ☆69Jul 18, 2025Updated 6 months ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Jan 7, 2020Updated 6 years ago
- DEPRECATED - web security checklist for Firefox Services☆78Jan 6, 2021Updated 5 years ago
- This repo would serve as an interface between the different clients and the platform. For API information please refer to the fabric8-ana…☆12Apr 13, 2023Updated 2 years ago
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- ☆15Mar 3, 2021Updated 4 years ago
- ☆11Feb 11, 2025Updated last year
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- An introduction to building a simple command-line interface for an embedded system.☆14May 20, 2025Updated 8 months ago
- App to quickly add Physical Machines into VMware Horizon Manual Pool☆11Mar 23, 2020Updated 5 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- Node backend for Android GPS Logger trackble-android☆15May 9, 2014Updated 11 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Sep 4, 2017Updated 8 years ago
- Grepable cheat sheets for pentesting. Each sheet one tool.☆11Oct 15, 2020Updated 5 years ago
- The main goal of this repo is to learn about the gRPC communication patterns and hunt for vulnerabilities in the gRPC-Web app to improve …☆10Jul 10, 2024Updated last year
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Query CSV files with SQL.☆11Oct 15, 2018Updated 7 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- The Penultimate Cloud Image Builder☆11Dec 27, 2021Updated 4 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- ☆14Mar 8, 2018Updated 7 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago