tilakthimmappa / pyraiderLinks
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
☆17Updated 3 years ago
Alternatives and similar repositories for pyraider
Users that are interested in pyraider are comparing it to the libraries listed below
Sorting:
- ☆10Updated 3 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆25Updated 3 years ago
- Vulnerable Task Manager☆16Updated 4 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Updated 3 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆11Updated 9 months ago
- A modern code-injection framework for Python. Like Pyrasite but Kubernetes-aware.☆64Updated 3 weeks ago
- OWASP Foundation Web Respository☆9Updated this week
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 4 years ago
- Audit python packages for known vulnerabilities☆32Updated 3 years ago
- A project to visualize the software supply chain☆52Updated last year
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Python Faker provider for security related data☆40Updated last month
- Helm chart for Open Cyber Threat Intelligence Platform☆20Updated this week
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 weeks ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆14Updated this week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated last month
- Python script to check HTTP security headers☆65Updated 5 months ago
- ☆35Updated 4 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆37Updated last year
- Burp Suite DAST Power Tools☆18Updated last month
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Backend for Nuclear Pond☆21Updated last year
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Updated 10 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year