snyk-labs / snync
Mitigate security concerns of Dependency Confusion supply chain security risks
☆46Updated 2 years ago
Alternatives and similar repositories for snync:
Users that are interested in snync are comparing it to the libraries listed below
- Dependency Combobulator☆93Updated last year
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 3 years ago
- Fetch the details of assets hosted on AWS.☆86Updated last year
- A collection of my Semgrep rules☆48Updated last year
- ☆22Updated 2 years ago
- Manual JavaScript Linting is a Bug☆49Updated 4 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆64Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆23Updated 8 months ago
- ☆19Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 8 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 3 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 6 months ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- AWS Security Checks☆37Updated 7 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆102Updated last month
- a shared short domain for XSS and other hacks☆31Updated 3 years ago
- Nuclei plugins to audit Chrome extensions☆64Updated 8 months ago
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆32Updated 2 months ago
- ☆90Updated 3 years ago
- ☆70Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated last year
- Scan secrets from Continuous Integration Build Logs☆52Updated 5 years ago
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆56Updated 6 months ago
- Scan DockerHub images that match a keyword to find secrets.☆55Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Extract relative urls from a heap snapshot☆85Updated 3 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 2 years ago