secutils-dev / secutilsLinks
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
☆75Updated this week
Alternatives and similar repositories for secutils
Users that are interested in secutils are comparing it to the libraries listed below
Sorting:
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working s…☆28Updated last year
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated this week
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- one-stop resource for all things offensive security.☆171Updated last month
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆174Updated 5 months ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆383Updated 11 months ago
- Web Server Vulnerability Scanning Tool☆36Updated 6 months ago
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆79Updated 6 months ago
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆52Updated 11 months ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆179Updated last year
- A modern, fast, and lightweight subdomain discovery tool built in Go☆26Updated this week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆153Updated 10 months ago
- Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teams☆75Updated last week
- Fast and easy to use CLI-based file encryption program 📦☆13Updated last week
- A multi-vault secret injection tool for safely injecting secrets into app environment☆128Updated last week
- Link Dumper is a powerful Python-based web crawler designed for pentesting and reconnaissance.☆52Updated 7 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Updated 5 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Updated 3 weeks ago
- Open-source best practices for protecting a secure, sensible cloud platform☆127Updated 11 months ago
- Stalker, the Extensible Attack Surface Management tool.☆86Updated this week
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 3 weeks ago
- Anti-Ransomware to mitigate and neutralize Ryuk Threat.☆19Updated last year
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆28Updated this week
- Security tool against dependency typosquatting attacks☆54Updated this week
- Prevent merging of malicious code in pull requests☆235Updated 6 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 8 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆53Updated 2 months ago
- Customized CVE FEED Notifier☆114Updated 5 months ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆332Updated last week