Highlights
- Pro
Stars
✨ Innovative and open-source visualization application that transforms various data formats, such as JSON, YAML, XML, CSV and more, into interactive graphs.
A vulnerability risk scoring framework that adds system context to CVSS scores. Transform theoretical vulnerability ratings into real-world risk assessments based on your actual security posture.
OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys.
Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
Safety checks Python dependencies for known security vulnerabilities and suggests the proper remediations for vulnerabilities detected.
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Build Container Images In Kubernetes
The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
Scapy: the Python-based interactive packet manipulation program & library.
A vulnerability scanner for container images and filesystems
A sample Telegram Python Bot (PTB) v20.x using Webhooks that runs on AWS Serverless
Comparing the free tier offers of the major cloud providers like AWS, Azure, GCP, Oracle etc.
A set of functions to download data from WHOOP
FastF1 is a python package for accessing and analyzing Formula 1 results, schedules, timing data and telemetry
📊⚽ A collection of football analytics projects, data, and analysis by Edd Webster (@eddwebster), including a curated list of publicly available resources published by the football analytics community.
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Implementation of the Practical Byzantine Fault Tolerant Algorithm (pbft)
a blockchain network simulator aimed at researching consensus algorithms for performance and security
Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)
Automated cryptocurrency trading on Coinbase Pro (formerly gdax-trader)
This repository is a fork of Microsoft Research's homomorphic encryption implementation, the Simple Encrypted Arithmetic Library (SEAL). This code wraps the SEAL build in a docker container and pro…