trailofbits / deptectiveLinks
Deptective automatically determines the native dependencies required to run any arbitrary program or command.
☆117Updated last week
Alternatives and similar repositories for deptective
Users that are interested in deptective are comparing it to the libraries listed below
Sorting:
- Code Pathfinder, the open-source alternative to GitHub CodeQL built with GoLang. Built for advanced structural search, derive insights, f…☆65Updated this week
- MCP security wrapper☆153Updated last week
- Security tool against dependency typosquatting attacks☆53Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆25Updated 7 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆40Updated 8 months ago
- Trail of Bits Testing Handbook☆78Updated 3 weeks ago
- ☆71Updated 3 weeks ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆84Updated 3 weeks ago
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆116Updated 2 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 4 months ago
- ☆82Updated last month
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆71Updated 4 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆33Updated 2 weeks ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated 7 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆93Updated last week
- A simple touchID prompt'er for use in shell scripts.☆98Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆179Updated last year
- 💅🏽 analyzes your github actions☆93Updated this week
- Data about all known supply-chain attacks through history☆58Updated 2 months ago
- A tool to automatically detect copy+pasted and vendored code between repositories☆61Updated last week
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated last year
- CLI tool for searching logs and unstructured content in Amazon S3 buckets☆187Updated last month
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆152Updated 9 months ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆80Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆73Updated last year
- Tool for obfuscating and deobfuscating data.☆72Updated last year
- An OpenAI API Compatible Honeypot Gateway☆16Updated 5 months ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆123Updated 5 months ago
- Prevent merging of malicious code in pull requests☆230Updated 5 months ago