☆25Mar 28, 2018Updated 7 years ago
Alternatives and similar repositories for pixi
Users that are interested in pixi are comparing it to the libraries listed below
Sorting:
- Part of the deprecated secureCodeBox v1, see secureCodeBox/secureCodeBox Repo for v2☆14Jul 16, 2020Updated 5 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 weeks ago
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Feb 4, 2025Updated last year
- A GitHub Action for scanning using Deep Security Smart Check.☆16Oct 4, 2023Updated 2 years ago
- Logz.io Public API Documentation☆18Jun 17, 2020Updated 5 years ago
- ☆25Jun 27, 2024Updated last year
- ☆21Nov 30, 2019Updated 6 years ago
- Everything Application Security☆27Updated this week
- MIRO - Merge it robot!☆25Feb 23, 2021Updated 5 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆26Nov 23, 2017Updated 8 years ago
- A comprehensive database of Model Context Protocol vulnerabilities, security research, and exploits☆34Feb 16, 2026Updated 2 weeks ago
- UI für verschiedene Reifegrad-Dimensionen☆32Dec 10, 2022Updated 3 years ago
- ☆43Aug 27, 2025Updated 6 months ago
- 💣 REST and SOAP web API fuzzer☆25May 17, 2016Updated 9 years ago
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 3 weeks ago
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- This service provides authenticated access to a static website hosted in an s3 bucket.☆33Feb 25, 2023Updated 3 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆133Dec 22, 2022Updated 3 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Smart, friendly and helpful chat bot for OWASP Juice Shop☆11Jan 26, 2026Updated last month
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Deprecated; please use https://github.com/marketplace/actions/fortify-ast-scan instead☆13Nov 1, 2023Updated 2 years ago
- K8 Deep dive - Core Concepts, CRDs, Operators, Controllers, Openshift, kubebuilder, Coreos operator framework☆10May 1, 2023Updated 2 years ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago