tilakthimmappa / pyraiderLinks
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
☆17Updated 3 years ago
Alternatives and similar repositories for pyraider
Users that are interested in pyraider are comparing it to the libraries listed below
Sorting:
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Updated 3 years ago
- Python Faker provider for security related data☆40Updated 2 months ago
- An intentionally vulnerable django app, to help django developers learn security testing☆45Updated 2 years ago
- Audit python packages for known vulnerabilities☆33Updated 3 years ago
- ☆10Updated 3 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated 2 years ago
- A dictionary attack tool for PostgreSQL and MSSQL☆37Updated 3 years ago
- A modern code-injection framework for Python. Like Pyrasite but Kubernetes-aware.☆68Updated 6 months ago
- tool for sniffing images over HTTP traffic and showing them on the console. Designed for remote shells.☆12Updated 5 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 5 years ago
- Pull secrets from an AWS environment☆68Updated 5 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- ☆27Updated 3 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 2 years ago
- find dangling domains in a multi cloud environment☆172Updated last week
- Intentionally Vulnerable Flask app for use in Demos☆33Updated 3 months ago
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- Offensive Terraform Website☆45Updated 5 years ago
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 5 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆68Updated 5 months ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆15Updated 5 years ago
- Sqreen Security Checklist Transformer & Uploader☆28Updated 4 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆82Updated 4 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- Automated API security testing☆88Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- A meta-database collecting resources that compile lists of breaches☆21Updated last week