tilakthimmappa / pyraiderLinks
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
☆17Updated 3 years ago
Alternatives and similar repositories for pyraider
Users that are interested in pyraider are comparing it to the libraries listed below
Sorting:
- Python Faker provider for security related data☆40Updated 3 weeks ago
- ☆10Updated 3 years ago
- A dictionary attack tool for PostgreSQL and MSSQL☆37Updated 3 years ago
- An intentionally vulnerable django app, to help django developers learn security testing☆44Updated last year
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- A modern code-injection framework for Python. Like Pyrasite but Kubernetes-aware.☆66Updated 3 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Vulnerable Task Manager☆17Updated 6 months ago
- ☆27Updated 2 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆16Updated last week
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- Audit python packages for known vulnerabilities☆33Updated 3 years ago
- ☆14Updated last year
- A GitHub Action for pip-audit☆75Updated this week
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Updated 11 months ago
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 5 years ago
- Sqreen Security Checklist Transformer & Uploader☆28Updated 4 years ago
- Tool for obfuscating and deobfuscating data.☆72Updated last year
- tool for sniffing images over HTTP traffic and showing them on the console. Designed for remote shells.☆12Updated 5 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 months ago
- Pull secrets from an AWS environment☆70Updated 5 years ago
- OWASP Foundation Web Respository☆9Updated last week
- Helm chart for Open Cyber Threat Intelligence Platform☆25Updated this week
- find dangling domains in a multi cloud environment☆142Updated last month
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- Automated API security testing☆87Updated last year
- A project to visualize the software supply chain☆52Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 4 years ago