Inspect your builds to look for changes in filesystem, network traffic and running processes.
☆13Aug 10, 2018Updated 7 years ago
Alternatives and similar repositories for build-inspector
Users that are interested in build-inspector are comparing it to the libraries listed below
Sorting:
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆44May 4, 2022Updated 3 years ago
- ☆15Jul 11, 2018Updated 7 years ago
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 5 months ago
- Graph-based incremental static analysis of ECMAScript 6 source code repositories☆20Feb 18, 2018Updated 8 years ago
- ☆19Feb 1, 2016Updated 10 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated last month
- 🤓 user2code2vec: Embeddings for Profiling Students Based on Distributional Representations of Source Code. Full Paper presented at Learn…☆22May 23, 2019Updated 6 years ago
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Oct 11, 2018Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆36Dec 5, 2025Updated 3 months ago
- A CLI to use a Google Cloud KMS key for PGP signing operations.☆43Feb 28, 2021Updated 5 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- StatsD backend for Application Insights Node.js☆16Jul 22, 2020Updated 5 years ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Deploy Backup and DR appliances☆12Feb 24, 2026Updated last week
- [MIRROR] Alpine Linux security database☆40Jun 8, 2020Updated 5 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- contains C programs that tests the effectiveness of SAST.☆12Jan 9, 2024Updated 2 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Example Cloud Foundry application for use with Pivotal Redis service☆11Jun 27, 2025Updated 8 months ago
- Kieler Analyzer for Executables and Libraries - an interactive disassembler☆11May 24, 2018Updated 7 years ago
- Faker for C#☆20Sep 13, 2019Updated 6 years ago
- Yeoman generator for scaffolding Azure Service Fabric C# projects☆17Jul 12, 2023Updated 2 years ago
- A tool to check for potential open source licensing problems.☆12Aug 17, 2016Updated 9 years ago
- A small test for multithreaded C++ stack unwinding on unixes☆16Feb 24, 2020Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Trustcache injector for iOS 11.3-11.4☆10Jul 26, 2018Updated 7 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- ☆13Feb 10, 2026Updated 3 weeks ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Dockerizing the quicklisp dist build process☆10Jan 3, 2019Updated 7 years ago
- Apropos across Quicklisp libraries☆10May 6, 2023Updated 2 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- iOS app for reading Lobste.rs.☆14Aug 1, 2017Updated 8 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago