Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
-
Updated
May 20, 2024
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
The Network Execution Tool
HackerOne "in scope" domains
Hourly updated database of exploit and exploitation reports
Fraud Detection for VoIP. Use SentryPeer® HQ to help prevent VoIP cyberattacks and fraudulent VoIP phone calls (toll fraud) at https://sentrypeer.com
Arcjet JS SDKs. Next.js & Node.js library for rate limiting, bot protection, email verification & defense against common attacks.
The documentation website for Secutils.dev
RogueMaster Flipper Zero Firmware
Open Source Cloud Native Application Protection Platform (CNAPP)
Allows users to start security scans via Netsparker Enterprise
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
The web user interface for Secutils.dev
Service to share passwords, secret notes securely
Daemon to ban hosts that cause multiple authentication errors
SecObserve is an open source vulnerability management system for software development and cloud environments. It supports a variety of open source vulnerability scanners and integrates easily into CI/CD pipelines.
The Security Toolkit for LLM Interactions