Red team tool that emulates the SolarWinds CI compromise attack vector.
☆24Mar 15, 2024Updated 2 years ago
Alternatives and similar repositories for solarsploit
Users that are interested in solarsploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆14Sep 28, 2023Updated 2 years ago
- apt2sbom python package generates SPDX or CycloneDX files from Ubuntu APT and Python packaging information☆25Feb 4, 2022Updated 4 years ago
- Go implementation of The Update Framework heavily influenced by python-tuf☆14Mar 7, 2024Updated 2 years ago
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- The memfs package is an in memory filesystem for go.☆15Feb 24, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An auto-configuring reverse DNS name server☆11Nov 2, 2025Updated 5 months ago
- ☆12Oct 17, 2024Updated last year
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆42Apr 22, 2026Updated last week
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Different AI stuff to IRC bot☆13Oct 10, 2025Updated 6 months ago
- An iproute2 utility written in Go.☆21May 27, 2024Updated last year
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- Specification for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆26Nov 17, 2025Updated 5 months ago
- SPDX Merge tool☆51Apr 13, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆33Apr 22, 2025Updated last year
- Witness Examples☆12Feb 27, 2024Updated 2 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- Collating an overview of the open source software supply chain landscape -- and synthesizing that survey in a hopefully-useful way.☆33Apr 4, 2023Updated 3 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Mar 21, 2026Updated last month
- Damn Vulnerable SCA Application☆43Mar 30, 2026Updated last month
- Google Bot Guard Request☆18Dec 13, 2019Updated 6 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- Runs nmap on the LAN and then generates a basic ASCII network diagram, a 'hand drawn' network diagram and an bootstrap themed web report …☆23Feb 12, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Supply Chain Integrity Model☆107Jun 12, 2023Updated 2 years ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Jul 12, 2022Updated 3 years ago
- Next generation of Qubes OS builder☆25Apr 17, 2026Updated last week
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆33Sep 24, 2025Updated 7 months ago
- Software Supply Chain Attribute Integrity (SCAI) Demos and CLI tools☆19Apr 23, 2026Updated last week
- Package etherconn is a golang pkg that allow user to send/receive Ethernet payload (like IP pkt) or UDP packet ,with custom Ethernet enca…☆20Oct 14, 2024Updated last year
- The Dirty Pipe Vulnerability☆46Mar 8, 2022Updated 4 years ago
- Labeled vulnerability-package match pairs used as ground truth to evaluate vulnerability scanners☆14Updated this week
- Send keyboard events with Golang☆22Nov 5, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Toy distributed PostgreSQL by implementing SQL over KV☆11Jan 14, 2026Updated 3 months ago
- Pre-Commit hooks for FluxCD GitOps repos☆11Mar 30, 2026Updated last month
- Kubernetes KMS provider plugin, backed by Tencent Cloud KMS service☆17Jul 25, 2024Updated last year
- Cross-platform SOCKS5 proxy server program/library written in C that can also reverse itself over a firewall.☆32Aug 8, 2022Updated 3 years ago
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆18Oct 19, 2025Updated 6 months ago
- A project to maintain the list of CrowdStrike Falcon IP addressing for use in dynamic objects/lists on firewalls☆23Dec 8, 2021Updated 4 years ago
- ☆23Oct 26, 2021Updated 4 years ago