tilakthimmappa / pyraider
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
☆17Updated 2 years ago
Alternatives and similar repositories for pyraider:
Users that are interested in pyraider are comparing it to the libraries listed below
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Tools to automate AWS Cloud security assessments☆23Updated 4 years ago
- Python Faker provider for security related data☆37Updated 6 months ago
- Offensive Terraform Website☆44Updated 4 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆52Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆66Updated 4 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 8 months ago
- ☆18Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- Maturity Model Collaborative project☆14Updated last year
- ☆12Updated 3 years ago
- ☆10Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- ☆38Updated 10 months ago
- Burp Suite Enterprise Edition Power Tools☆17Updated 6 months ago
- ☆42Updated 8 months ago
- ☆28Updated 2 years ago
- Vulnerable Task Manager☆15Updated last month
- A meta-database collecting resources that compile lists of breaches☆18Updated 3 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- A dictionary attack tool for PostgreSQL and MSSQL☆36Updated 2 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆14Updated last year
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Updated 6 months ago
- Recon tool to query cloud prefixes for services associated with an IP address☆24Updated 4 months ago
- Contextal Platform, a powerful, open-source cybersecurity solution designed for contextual threat detection and intelligence.☆25Updated 3 weeks ago
- ⚙ DevSecOps Kubernetes Playground ("A Hacker's Guide to Kubernetes")☆16Updated last year