Security scanning & static analysis tool
☆93Oct 17, 2024Updated last year
Alternatives and similar repositories for dracon
Users that are interested in dracon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An authenticating Docker Registry proxy with transparent Kubernetes integration☆17Oct 18, 2020Updated 5 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Open-source distributed agent for privilege access management (PAM) and just-in-time access (JIT) to cloud infrastructure, SaaS applicati…☆34Updated this week
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 2 years ago
- Cloud-based Virtual Desktops on Google Cloud Platform☆25Aug 15, 2024Updated last year
- The security workflow engine!☆137Nov 20, 2025Updated 4 months ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆22Jul 11, 2023Updated 2 years ago
- An invoice management application built on the MEAN stack with intentional vulnerabilities used to demonstrate insecure configurations an…☆16Sep 4, 2020Updated 5 years ago
- API for parsing binary files using a predefined grammar☆15Nov 17, 2016Updated 9 years ago
- Oh My ZSH Kustomize Plugin☆15May 28, 2025Updated 9 months ago
- ☆25Aug 3, 2024Updated last year
- ☆16Oct 3, 2018Updated 7 years ago
- DefectDojo Community Content☆19Nov 9, 2025Updated 4 months ago
- Automated determination of which AWS services run where☆20Updated this week
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 2 years ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆187Aug 28, 2025Updated 6 months ago
- Equal Experts Secure Delivery Playbook☆27Feb 21, 2023Updated 3 years ago
- Easily run Conftest, pull remote policies, surface the results, and obtain test metrics☆12Oct 2, 2025Updated 5 months ago
- Content for OWASP Summit 2017 site☆129Nov 12, 2020Updated 5 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 5 months ago
- OWASP Foundation Web Respository☆17Dec 9, 2025Updated 3 months ago
- Searching Go code with a graph database☆27Jun 24, 2022Updated 3 years ago
- xargs for semgrep☆29Mar 27, 2024Updated last year
- ☆27Sep 4, 2017Updated 8 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- A tool to find redirection chains in multiple URLs☆78Jan 1, 2025Updated last year
- Gungnir - Homelab Automation Tool to Guard your very own Asgard☆16Jan 26, 2026Updated last month
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- Rumble Network Discovery API☆17May 16, 2024Updated last year
- Provides access to libhashcat☆31Apr 6, 2024Updated last year
- ZAP test code☆14May 7, 2015Updated 10 years ago
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 5 years ago
- BadRobot - Operator Security Audit Tool☆226Feb 2, 2026Updated last month
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- ☆49Feb 10, 2019Updated 7 years ago
- Functionality and DataModels of OWASP CycloneDX for PHP☆13Mar 17, 2026Updated last week
- Given a string determine the possible hashing algorithms used to produce that string.