tilakthimmappa / pyraiderLinks
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
☆17Updated 3 years ago
Alternatives and similar repositories for pyraider
Users that are interested in pyraider are comparing it to the libraries listed below
Sorting:
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Updated 3 years ago
- Python Faker provider for security related data☆40Updated 3 months ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- ☆27Updated 3 years ago
- An intentionally vulnerable django app, to help django developers learn security testing☆45Updated 2 years ago
- ☆10Updated 3 years ago
- A dictionary attack tool for PostgreSQL and MSSQL☆37Updated 3 years ago
- Pull secrets from an AWS environment☆68Updated 5 years ago
- A modern code-injection framework for Python. Like Pyrasite but Kubernetes-aware.☆69Updated 6 months ago
- Audit python packages for known vulnerabilities☆33Updated 3 years ago
- find dangling domains in a multi cloud environment☆173Updated 3 weeks ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated 2 years ago
- A GitHub Action for pip-audit☆79Updated this week
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 2 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- Automated API security testing☆88Updated last year
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 5 years ago
- tool for sniffing images over HTTP traffic and showing them on the console. Designed for remote shells.☆12Updated 5 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆69Updated 6 months ago
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆69Updated 5 years ago
- OWASP ZAP addon for finding vulnerabilities in JWT Implementations☆36Updated 8 months ago
- arbitrary TCP and UDP connections and listens (Netcat for Python).☆100Updated last year
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Updated last year
- software asset scanning orchestration system☆29Updated last week
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Updated 4 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆37Updated last month
- A security-first linter for code that shouldn't need linting☆16Updated 2 years ago
- ☆19Updated last year
- Security scanner using YARA☆17Updated last month