Asset inventory of over 800 public bug bounty programs.
-
Updated
Jun 3, 2024 - Shell
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Asset inventory of over 800 public bug bounty programs.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return results as STIX Observations.
OXO is a security scanning orchestrator for the modern age.
Adversary Emulation Framework
🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
An example JS application showing Arcjet security functionality - signup form abuse protection, bot detection, rate limiting & attack protection.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
HackerOne "in scope" domains
Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
Hourly updated database of exploit and exploitation reports
A modular vulnerability scanner with automatic report generation capabilities.
The Security Toolkit for LLM Interactions
Bandit is a tool designed to find common security issues in Python code.
SecHub provides a central API to test software with different security tools.
A recursive internet scanner for hackers.
Security tool against dependency typosquatting attacks