security-tools
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 2,674 public repositories matching this topic...
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
-
Updated
Mar 17, 2022 - Shell
config validation
Is your feature request related to a problem? Please describe.
It would be nice if gitleaks had a validate command that would validate examples found in the config rules. Introducing such a feature would speed up rule development and help with debugging.
Describe the solution you'd like
example entry in the rules tables
ex:
[[rules]]
id = "discord-client-secret"
desAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
-
Updated
Apr 8, 2022 - Go
API, CLI, and Web App for analyzing and finding a person's profile in +1000 social media \ websites
-
Updated
Mar 31, 2022 - JavaScript
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
-
Updated
Apr 7, 2022 - Python
Hi & welcome to Scapy's github ! This page lists issues that you can try to fix if you want to start contributing to Scapy.
This list includes wishes and things added by the maintainers based on the issues that we get, but also issues marked with TODO or XXX that already exist in Scapy's code base (layers). If you want to contribute to the project you might just take care one of the bugs.
Daemon to ban hosts that cause multiple authentication errors
-
Updated
Apr 8, 2022 - Python
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
-
Updated
Mar 22, 2022 - Shell
A static analysis security vulnerability scanner for Ruby on Rails applications
-
Updated
Apr 8, 2022 - Ruby
-
Updated
Apr 8, 2022
Golang security checker
-
Updated
Apr 5, 2022 - Go
RustScan has an accessible mode, rustscan --accessible which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!][~][>]| {}
If any of these characters appear in any of the tests, fail the CI. E
A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
-
Updated
Mar 30, 2022
Infection Monkey - An automated pentest tool
-
Updated
Apr 8, 2022 - Python
Attack Surface Management Platform | Sn1perSecurity LLC
-
Updated
Feb 9, 2022 - Shell
Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
-
Updated
Apr 7, 2022 - Shell
-
Updated
Mar 31, 2022 - Go
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant
README translations
The recommendation is to set Cache-Control: private, no-store on any endpoint with sensitive information. Because while you can protect the traffic with TLS, you also need to keep sensitive information out of a client's (unencrypted) HTTP cache. I'm not sure how relevant this is to the API context of step-ca though—I've never seen an HTTP client library that caches content. But I guess the poi
syzkaller is an unsupervised coverage-guided kernel fuzzer
-
Updated
Apr 8, 2022 - Go
Describe the bug
A clear and concise description of what the bug is.
To Reproduce
Steps to reproduce the behavior:
- create
.banditfile with content:
[bandit]
tests: B101,B102,B301
- run
bandit -c .bandit -r module/ - get error:
[main] ERROR .bandit : Error parsing file.
Expected behavior
working as described in readme
Bandit version
ba
A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
-
Updated
Mar 31, 2022 - C#
Modlishka. Reverse Proxy.
-
Updated
Feb 16, 2022 - Go
Hey, here we need add url decoding cuz that invalid link with symbols of get request like ?, &, = etc
p.s thx for awesome tool
A Workflow Engine for Offensive Security
-
Updated
Apr 6, 2022 - Go
Next generation web scanner
-
Updated
Feb 5, 2022 - Ruby
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
-
Updated
Jan 31, 2022
My simple Swiss Army knife for http/https troubleshooting and profiling.
-
Updated
Mar 22, 2022 - Shell
Linux privilege escalation auditing tool
-
Updated
Apr 1, 2022 - Shell
- Wikipedia
- Wikipedia



Hi,
it would be nice, if pod annotations would be configurable via values file. E.g:
values.yaml:
statefulset.yaml: