trailofbits / deptectiveLinks
Deptective automatically determines the native dependencies required to run any arbitrary program or command.
☆126Updated last week
Alternatives and similar repositories for deptective
Users that are interested in deptective are comparing it to the libraries listed below
Sorting:
- An open-source security suite aiming to combine structural code analysis with AI-powered vulnerability detection. Built for advanced stru…☆82Updated last week
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆84Updated last month
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆41Updated 11 months ago
- Security tool against dependency typosquatting attacks☆54Updated this week
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated 2 months ago
- A tool to automatically detect copy+pasted and vendored code between repositories☆73Updated this week
- 💅🏽 analyzes your github actions☆97Updated 2 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated 3 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 8 months ago
- MCP security wrapper☆204Updated this week
- An OpenAI API Compatible Honeypot Gateway☆17Updated 8 months ago
- Data about all known supply-chain attacks through history☆62Updated 6 months ago
- ☆74Updated last month
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆180Updated last year
- CLI tool for searching logs and unstructured content in Amazon S3 buckets☆207Updated 4 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆37Updated last month
- ☆85Updated last month
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆92Updated 3 weeks ago
- Automated vulnerability discovery and annotation☆67Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆95Updated this week
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆73Updated 7 months ago
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆132Updated 5 months ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Updated 2 years ago
- Metis is an open-source, AI-driven tool for deep security code review☆367Updated this week
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆155Updated last year
- Web Server Vulnerability Scanning Tool☆36Updated 8 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆67Updated 2 months ago
- Prevent merging of malicious code in pull requests☆244Updated 8 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Updated 2 weeks ago