Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
-
Updated
Jun 1, 2024 - Go
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
HackerOne "in scope" domains
This repository contains Bug Bounty writeups
Hourly updated database of exploit and exploitation reports
A GitHub action that checks Python code using black and ruff
Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
SecObserve is an open source vulnerability management system for software development and cloud environments. It supports a variety of open source vulnerability scanners and integrates easily into CI/CD pipelines.
A Pentest Collaboration and Reporting Tool
Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact provenance.
Security - Pentesting - Enumeration - Tools and commands
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
A simple password manager with a twist.
Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers for image mimetype validation and much more.
Config files for my GitHub profile.
Open Source Cloud Native Application Protection Platform (CNAPP)
Audit your Node version for known CVEs and patches
Gather and update all available and newest CVEs with their PoC.
Time keeps on slipping...