tilakthimmappa / pyraider
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
☆17Updated 2 years ago
Alternatives and similar repositories for pyraider:
Users that are interested in pyraider are comparing it to the libraries listed below
- Python Faker provider for security related data☆39Updated 2 weeks ago
- ☆10Updated 2 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 5 months ago
- Offensive Terraform Website☆44Updated 4 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- Audit python packages for known vulnerabilities☆32Updated 3 years ago
- Pull secrets from an AWS environment☆70Updated 5 years ago
- ☆18Updated last year
- Privilege escalation in Docker☆29Updated 2 years ago
- ☆12Updated 4 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- ☆11Updated last year
- OWASP Foundation Web Respository☆9Updated last week
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- A dictionary attack tool for PostgreSQL and MSSQL☆37Updated 3 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- ☆41Updated last year
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆18Updated 4 years ago
- Helm chart for Open Cyber Threat Intelligence Platform☆19Updated this week
- tool for sniffing images over HTTP traffic and showing them on the console. Designed for remote shells.☆12Updated 4 years ago
- javaspringvulny - a Spring Boot web application built wrong on purpose☆19Updated last month
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆11Updated 7 months ago
- Some Cyber Security related roles Interview Questions☆10Updated 4 years ago
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 4 years ago