Inspect your builds to look for changes in filesystem, network traffic and running processes.
☆13Aug 10, 2018Updated 7 years ago
Alternatives and similar repositories for build-inspector
Users that are interested in build-inspector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Oct 11, 2018Updated 7 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆44May 4, 2022Updated 4 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated 3 months ago
- Windbg scripts☆20Mar 5, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- ☆15Jul 11, 2018Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- Experimental web browser☆21Mar 15, 2012Updated 14 years ago
- A poc to demonstrate how ransomware can spread to enterprise apps through libraries☆11Mar 28, 2018Updated 8 years ago
- 🤓 user2code2vec: Embeddings for Profiling Students Based on Distributional Representations of Source Code. Full Paper presented at Learn…☆22May 23, 2019Updated 6 years ago
- Website for JuliaOpt☆11Apr 8, 2026Updated 3 weeks ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- ☆19Feb 1, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Just a Streamlit app to generate scientific review with Deep Learning, Neuronal Network and AI☆14Sep 18, 2025Updated 7 months ago
- A lisp that compiles to rubinius bytecode☆13Oct 14, 2016Updated 9 years ago
- ☆14May 18, 2024Updated last year
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- ☆13Feb 18, 2025Updated last year
- Local Maltego Transforms for crt.sh☆12Sep 8, 2017Updated 8 years ago
- go-bssid-geolocator☆14Mar 19, 2025Updated last year
- Securade.ai Sentinel - A monitoring and surveillance application that enables visual Q&A and video captioning for existing CCTV cameras.☆29Apr 6, 2025Updated last year
- contains C programs that tests the effectiveness of SAST.☆12Jan 9, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Various things to share☆11Sep 22, 2018Updated 7 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Jan 26, 2017Updated 9 years ago
- Python implementation of the package url spec. This project is sponsored by NLnet project https://nlnet.nl/project/vulnerabilitydatabase…☆89Mar 11, 2026Updated last month
- BluemarkInnovations/remoteID-MQTT-subscriber☆17Jun 25, 2025Updated 10 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆25Mar 3, 2025Updated last year
- Container library for Lazarus☆13Sep 29, 2016Updated 9 years ago
- Multi theaded DNS bruteforcing☆13May 7, 2014Updated 11 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Quantic implementation of the k-means clustering algorithm☆16Jun 9, 2019Updated 6 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 11 months ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆19Sep 16, 2025Updated 7 months ago
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- Atomist SDM to find exposed secrets in repos☆19Apr 23, 2019Updated 7 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆16May 17, 2018Updated 7 years ago