tilakthimmappa / pyraider
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
☆17Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for pyraider
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆52Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆21Updated last year
- Vulnerable Task Manager☆15Updated this week
- A command-line whois - like client for the WHOIS and WHOIS History APIs by WhoisXML API Inc.☆17Updated 2 years ago
- ☆14Updated last year
- A project to visualize the software supply chain☆36Updated last year
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 2 years ago
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 4 years ago
- Burp Suite Enterprise Edition Power Tools☆16Updated 3 months ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 2 weeks ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated last year
- Python Faker provider for security related data☆36Updated 3 months ago
- Offensive Terraform Website☆44Updated 4 years ago
- Helm chart for Open Cyber Threat Intelligence Platform☆13Updated this week
- ☆18Updated 9 months ago
- Awesome list for cloud security related projects☆77Updated 2 years ago
- Pull secrets from an AWS environment☆69Updated 4 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆13Updated 4 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆21Updated 2 years ago
- DefectDojo Community Content☆17Updated last month
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 5 months ago
- Maturity Model Collaborative project☆13Updated last year
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- tool for sniffing images over HTTP traffic and showing them on the console. Designed for remote shells.☆12Updated 4 years ago
- Curated list of security tools☆61Updated 10 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago