Mitigate security concerns of Dependency Confusion supply chain security risks
☆51Jan 15, 2026Updated last month
Alternatives and similar repositories for snync
Users that are interested in snync are comparing it to the libraries listed below
Sorting:
- Snyk Node Runtime Agent☆16Apr 12, 2022Updated 3 years ago
- ☆12Jan 9, 2023Updated 3 years ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated last month
- Example Code Review Exercise☆14Apr 14, 2025Updated 10 months ago
- GitHub Action adding a comment with information about new npm dependencies detected in a pull request☆17Mar 30, 2024Updated last year
- ASCII Smuggling Hidden Prompt Injection is a novel approach to hacking AI assistants using Unicode Tags. This project demostrate how to u…☆18Aug 7, 2024Updated last year
- ☆20Sep 6, 2023Updated 2 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Jun 6, 2024Updated last year
- ESLint plugin to detect and stop Trojan Source attacks☆79Nov 9, 2025Updated 3 months ago
- Dependency Combobulator☆95Jan 10, 2024Updated 2 years ago
- everyone can fuzz h2☆24Mar 13, 2019Updated 6 years ago
- ESLint plugin with rules for finding security issues in React projects.☆19Jun 28, 2025Updated 8 months ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 8 months ago
- Simplified pure Java http server☆11May 20, 2022Updated 3 years ago
- Hands-on practical use of HTTP security headers as browser security controls to help secure web applications☆19Jan 14, 2023Updated 3 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26May 14, 2023Updated 2 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆61May 29, 2022Updated 3 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- ☆26Feb 3, 2026Updated last month
- Pythonic interface to the Internet Storm Center / DShield API.☆29May 23, 2023Updated 2 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- ☆13Aug 5, 2025Updated 7 months ago
- HaE - BurpSuite Highlighter and Extractor☆33Jan 19, 2026Updated last month
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Jun 22, 2023Updated 2 years ago
- Man in the Middle SOCKS Proxy for JAVA☆37Feb 14, 2013Updated 13 years ago
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- ☆12Nov 19, 2021Updated 4 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆14Mar 10, 2025Updated 11 months ago
- Python script for finding resource tags without subresource integrity.☆40Jul 9, 2025Updated 7 months ago
- Reuse cucumber scenarios by using "Given the scenario [scenario's tag]"☆11Oct 4, 2018Updated 7 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- A code quality tool for any language or platform (CURRENTLY OFFLINE—see https://github.com/forthright/ferret_temp)☆37Sep 2, 2018Updated 7 years ago