| 02/27 | 8 |
Inspects Go source code for security issues by scanning the AST and SSA representations.
|
| 02/27 | 8 |
Workflow engine designed for scalable and customizable offensive security reconnaissance.
|
| 02/17 | 8 |
Kubernetes-based modular toolchain for continuous security scanning of software projects.
|
| 03/03 | 7 |
Comprehensive security scanner for vulnerabilities, misconfigurations, and secrets across various targets.
|
| 02/24 | 7 |
Cross-platform adversary emulation and red team framework with dynamic implants supporting multiple secure C2 protocols.
|
| 02/22 | 7 |
Highly customizable Web Application Firewall middleware providing advanced protection for the Caddy web server.
|
| 03/07 | 6 |
Tool for database anonymization and synthetic data generation.
|
| 03/06 | 6 |
Terminal UI wrapper for Trivy that runs image, filesystem, and Kubernetes vulnerability scans without Docker.
|
| 03/03 | 6 |
JavaScript AST analysis tool for identifying potentially malicious code patterns.
|
| 02/17 | 5 |
Security suite combining graph-based structural code analysis with AI-assisted vulnerability detection and IDE/CI integrations.
|
| 03/17 | 4 |
Private certificate authority for secure, automated certificate management in DevOps environments.
|
| 03/17 | 4 |
Easy-to-use CLI for building, operating, and automating PKI systems and common X.509, JWT, and crypto workflows.
|
| 03/13 | 3 |
Cybersecurity-focused domain-specific programming language with a dedicated virtual machine and IDE support.
|