Secure Code Review AI Agent (SeCoRA) - AI SAST
☆56Jan 29, 2025Updated last year
Alternatives and similar repositories for SeCoRA
Users that are interested in SeCoRA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆16May 2, 2026Updated last week
- BlueSky OSINT Tool☆15Dec 10, 2024Updated last year
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated last month
- ☆24Mar 4, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated last week
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆71Apr 30, 2026Updated last week
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆180Jan 9, 2026Updated 4 months ago
- A fun POC that is built to understand AI security agents.☆34Oct 30, 2025Updated 6 months ago
- Ensure your password safety by scanning in data breaches.☆115Apr 28, 2026Updated last week
- ☆39Jul 31, 2025Updated 9 months ago
- ☆154Dec 19, 2024Updated last year
- Repository containing slides for conferences I have spoken at.☆16Sep 28, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated last month
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 8 months ago
- Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and rever…☆50Apr 6, 2026Updated last month
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- A full insecure kubernetes application for testing security tools☆95Mar 28, 2026Updated last month
- Static Code Analysis for security teams with Inter file taint analysis. Built for finding vulnerabilities, advanced structural search, de…☆128Updated this week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆102Updated this week
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆252Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆38Feb 28, 2025Updated last year
- ☆164Mar 20, 2026Updated last month
- ☆52Apr 27, 2026Updated last week
- A research tool to identify the version of shared library files.☆22Mar 14, 2017Updated 9 years ago
- ☆72Oct 24, 2025Updated 6 months ago
- SBOM Move - Automate build and transfer of SBOMs across systems☆26May 1, 2026Updated last week
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆44Apr 23, 2026Updated 2 weeks ago
- FrogPost: postMessage Security Testing Tool☆107Dec 4, 2025Updated 5 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆52Mar 10, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆130Apr 8, 2026Updated last month
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆120Updated this week
- Caido plugin for jxscout☆15Nov 22, 2025Updated 5 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 4 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆24Apr 26, 2026Updated last week
- Security gateway for AI agents - credential-isolated API proxying and policy-gated remote execution (conclaves). Reduce the blast radius!☆130Mar 11, 2026Updated last month
- Telco training☆26Oct 17, 2018Updated 7 years ago