srcclr / build-inspector
Inspect your builds to look for changes in filesystem, network traffic and running processes.
β13Updated 6 years ago
Alternatives and similar repositories for build-inspector:
Users that are interested in build-inspector are comparing it to the libraries listed below
- Portcullis Computer Security Co-ordinated Disclosure Toolkitβ24Updated 4 years ago
- π― Vulnerability Pryer - Prying context into your vulnerability dataβ21Updated 3 years ago
- Python object interface to requests/responses recorded by Burp Suiteβ36Updated 5 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.netβ33Updated 11 months ago
- Run DependencyCheck Against Your Orgs GitHub Repos.β14Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.β20Updated 8 years ago
- Websocket based egress testerβ20Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.β12Updated 9 years ago
- Custom slash command to do ipinfo.io lookups from within Slackβ10Updated 8 years ago
- β32Updated 9 years ago
- Application Security Vulnerability Periodic Tableβ14Updated 10 years ago
- Repo to hold veracode related issues and code snippetsβ9Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysisβ42Updated 8 years ago
- DefectDojo Documentationβ16Updated 3 years ago
- AWS EC2 and S3 Security Auditing Toolβ41Updated 11 years ago
- β32Updated 10 years ago
- Custom slash command to do a basic dnsrecon from within Slackβ12Updated 8 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.β37Updated 8 years ago
- Faraday Workspaces for Bug Bountiesβ20Updated 9 years ago
- My Quick Note of BlackHat 2015 Arsenalβ27Updated 9 years ago
- Puny Domain Name Checkβ36Updated 5 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)β25Updated 6 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)β26Updated 10 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choiceβ48Updated 7 years ago
- β13Updated 7 years ago
- Checklist and tools for increasing security of Apache Airflowβ32Updated 3 years ago
- DNS Enumeration and Reconnaissance Toolβ37Updated 9 years ago
- A collection of pentest tools and resources targeting Hadoop environmentsβ35Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Executionβ23Updated 6 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multipleβ¦β24Updated 2 years ago