trailofbits / deptectiveLinks
Deptective automatically determines the native dependencies required to run any arbitrary program or command.
☆127Updated last month
Alternatives and similar repositories for deptective
Users that are interested in deptective are comparing it to the libraries listed below
Sorting:
- AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights …☆97Updated this week
- A tool to automatically detect copy+pasted and vendored code between repositories☆74Updated 2 weeks ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Updated 3 months ago
- Security tool against dependency typosquatting attacks☆54Updated this week
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated 5 months ago
- MCP security wrapper☆207Updated 2 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Updated 10 months ago
- Data about all known supply-chain attacks through history☆63Updated 8 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 10 months ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆108Updated this week
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Updated last year
- Pentester-focused Docker registry tool to enumerate and pull images☆36Updated 3 months ago
- ☆86Updated last month
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated last month
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆74Updated 9 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- 💅🏽 analyzes your github actions☆97Updated last month
- ☆76Updated 3 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆70Updated 4 months ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆124Updated 3 months ago
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- A web fuzzer using the httpipe format☆98Updated last year
- CLI tool for searching logs and unstructured content in Amazon S3 buckets☆213Updated 7 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆75Updated last year
- A tool for folks who `git clone` first and ask questions later☆65Updated 4 months ago
- Detecting Inconsistencies in Feature or Function Evaluations of Requirements☆68Updated last year
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Updated last year
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆159Updated last year
- Web Server Vulnerability Scanning Tool☆36Updated 10 months ago
- Trail of Bits Testing Handbook - appsec.guide☆92Updated last week