tilakthimmappa / pyraider
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
☆17Updated 2 years ago
Alternatives and similar repositories for pyraider:
Users that are interested in pyraider are comparing it to the libraries listed below
- ☆10Updated 2 years ago
- Python Faker provider for security related data☆38Updated this week
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear and Zendesk☆55Updated this week
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Pull secrets from an AWS environment☆70Updated 5 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆17Updated last year
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 4 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆35Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- A security-first linter for code that shouldn't need linting☆16Updated last year
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Updated 7 months ago
- Helm chart for Open Cyber Threat Intelligence Platform☆19Updated this week
- Publicly availalbe vulnarble by desgin vm/machines☆30Updated 2 years ago
- Burp Suite Enterprise Edition Power Tools☆17Updated 7 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- A meta-database collecting resources that compile lists of breaches☆18Updated 4 months ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- An intentionally vulnerable django app, to help django developers learn security testing☆41Updated last year
- A curated list of security tools for Hackers & Builders!☆99Updated 8 months ago
- a vulnerable GraphQL application☆19Updated 5 years ago
- A project to visualize the software supply chain☆43Updated last year
- OWASP Foundation Web Respository☆9Updated this week
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆11Updated 6 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 9 months ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year