tilakthimmappa / pyraiderLinks
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
☆17Updated 3 years ago
Alternatives and similar repositories for pyraider
Users that are interested in pyraider are comparing it to the libraries listed below
Sorting:
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Automated API security testing☆86Updated 11 months ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- Python Faker provider for security related data☆40Updated 3 months ago
- Vulnerable Task Manager☆17Updated 6 months ago
- A modern code-injection framework for Python. Like Pyrasite but Kubernetes-aware.☆65Updated 2 months ago
- Audit python packages for known vulnerabilities☆33Updated 3 years ago
- ☆10Updated 3 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- An intentionally vulnerable django app, to help django developers learn security testing☆44Updated last year
- find dangling domains in a multi cloud environment☆142Updated 2 weeks ago
- Pull secrets from an AWS environment☆70Updated 5 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- ☆19Updated last year
- This repo scans pypi for AWS keys☆106Updated last year
- A dictionary attack tool for PostgreSQL and MSSQL☆37Updated 3 years ago
- A meta-database collecting resources that compile lists of breaches☆21Updated 8 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆64Updated last month
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 3 years ago
- tool for sniffing images over HTTP traffic and showing them on the console. Designed for remote shells.☆12Updated 4 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- A project to visualize the software supply chain☆51Updated last year
- ☆14Updated last year
- Find secrets in your codebase☆125Updated 4 months ago
- InfoSec OpenAI Examples☆19Updated last year
- github action to run the bandit security linter☆14Updated 9 months ago
- arbitrary TCP and UDP connections and listens (Netcat for Python).☆103Updated 9 months ago
- A security-first linter for code that shouldn't need linting☆16Updated last year