srcclr / build-inspectorLinks
Inspect your builds to look for changes in filesystem, network traffic and running processes.
☆13Updated 7 years ago
Alternatives and similar repositories for build-inspector
Users that are interested in build-inspector are comparing it to the libraries listed below
Sorting:
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 3 months ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Recon system hardening scanner☆46Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Community rules for Commit Watcher☆24Updated 9 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 9 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Marvin-django is the UI/database part of the Marvin project. Marvin is a platform for security analysis of Android apps.☆74Updated 5 months ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- DEF CON 26 WorkShop - Fuzzing FTW☆20Updated 7 years ago
- ☆15Updated 9 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- A repo for various research☆102Updated 3 years ago
- A tool for automatic black-box detection of missing hostname verification, including for applications that use certificate pinning.☆19Updated 6 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- A tool to generate statistics and help manage bug bounty reports in HackerOne.☆22Updated 5 years ago
- POLAR☆73Updated 6 years ago
- ☆50Updated 7 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- An attack tree generator built on electron☆62Updated 9 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆44Updated last year
- Network and USB protocol fuzzing toolkit.☆34Updated 8 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 5 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- A collaborative CTF framework written in Django.☆17Updated 10 years ago