Stars
- All languages
- Assembly
- Bicep
- Bikeshed
- C
- C#
- C++
- CSS
- Clojure
- CoffeeScript
- Dockerfile
- Elixir
- Erlang
- Go
- Groovy
- HCL
- HTML
- Haskell
- Io
- Java
- JavaScript
- Jsonnet
- Jupyter Notebook
- Kotlin
- Lua
- MDX
- Makefile
- Mustache
- Nim
- Nix
- OCaml
- Objective-C
- Objective-C++
- Open Policy Agent
- PHP
- Perl
- PowerShell
- Python
- Racket
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Starlark
- Swift
- SystemVerilog
- TSQL
- TeX
- TypeScript
- V
- Vim Script
- Vue
- YAML
- YARA
- Zeek
- Zig
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers…
Fast and accurate AI powered file content types detection
Network-wide ads & trackers blocking DNS server
Threat model for Google BigQuery - Library of all the attack scenarios on Google BigQuery, and how to mitigate them following a risk-based approach
Regularly-updated directory of all custom constraints available in GCP, including services, resources, and fields
Scan MCP servers for potential threats & security findings.
Powershell module for interfacing with Unity installs and projects.
The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers
AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection
Simple root privilege escalation detection using eBPF 🐝
A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or artifact repositories.
Write Cloudflare Workers in 100% Rust via WebAssembly
High-performance safety rules engine for real-time event processing at scale
JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by outputting data as JSON for ingestion into BloodHound.
Code for the paper "Defeating Prompt Injections by Design"
Extensible memoizing collections and decorators
Buttercup finds and patches software vulnerabilities
An AI-powered security review GitHub Action using Claude to analyze code changes for security vulnerabilities.
Build Real-Time Knowledge Graphs for AI Agents
Constrain, log and scan your MCP connections for security vulnerabilities.
Code snippets to reproduce MCP tool poisoning attacks.