Jenkins plugin for OWASP Dependency-Check. Inspects project components for known vulnerabilities (e.g. CVEs).
-
Updated
Jun 1, 2024 - Java
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Jenkins plugin for OWASP Dependency-Check. Inspects project components for known vulnerabilities (e.g. CVEs).
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
An auto-updating list of shodan dorks with info on the amount of results they return!
Community curated list of templates for the nuclei engine to find security vulnerabilities.
IP block lists for: Malware, Bots, Hackers, Sniffers, etc..
🚀 An open and lightweight modification to Windows, designed to optimize performance, privacy and security.
Fuzz Introspector -- introspect, extend and optimise fuzzers
VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE, CVE, MITRE ATT&CK, PCI DSS, issues import Nmap/Nessus/Burp/OpenVAS/Bugcrowd/Trivy, Jira export, TXT/JSON/MARKDOWN/HTML/PDF report, attachments, automatic changelog, statistics, vulnerability management, bug bounty, pentest reporting, etc..
Active Directory and Internal Pentest Cheatsheets
This repository by Sequoia Heights MS offers an integrated solution featuring a probe and client. Our blocklists, sourced from our honeypot network, are freely available. We provide a sync client for up-to-date protection and a probe tool for contributing new data.
Build GraphQL as the speed of thought
Purely functional Scala library for Open ID Connect 1.0 token verification and decoding
Asset inventory of over 800 public bug bounty programs.
HackerOne "in scope" domains
Blocklist for newly created scam and phishing domains automatically retrieved daily using Google Search API, automated detection, and other public sources.
A Python encryption library implemented in Rust. It supports AEAD with AES-GCM and ChaCha20Poly1305. It uses ring crate to handle encryption.
GuardRails provides continuous security feedback for modern development teams
Protect your app from malicious open source dependencies
Backup repositories, metadata and LFS into AWS, Azure, OneDrive, GCP, etc. Pay per repositories, not seats. SOC2 in progress
Keep dependencies up-to-date with automated Pull Requests
Automatic daily backups of your GitHub repos and metadata with on-demand restores to protect your business
Find, fix (and prevent!) known vulnerabilities in your code
Runtime Code Review
We help developers write clean code
Code scanning at ludicrous speed. Find bugs and reachable dependency vulnerabilities. Enforce standards on every commit
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support