Loading...
Browse 35 git tools
Continuous secret scanning and leak detection tool with precommit checks
Continuous secret scanning and leak detection tool with precommit checks
Secrets scanning tool that detects credentials in code repos and SDLC platforms
Secrets scanning tool that detects credentials in code repos and SDLC platforms
Enterprise secrets scanning tool for SDLC with continuous monitoring & remediation
Enterprise secrets scanning tool for SDLC with continuous monitoring & remediation
AI-powered continuous pentesting that finds and fixes vulnerabilities
Detects API keys, passwords, and tokens in code with AI-based false positive filtering.
Detects API keys, passwords, and tokens in code with AI-based false positive filtering.
AppSec risk mgmt platform with vuln tracking, attribution & metrics
AppSec risk mgmt platform with vuln tracking, attribution & metrics
AI-powered automated code fix generation for security vulnerabilities
AI-powered automated code fix generation for security vulnerabilities
Scans Git repos for PII/PHI leaks in code, commits, and branches.
Scans Git repos for PII/PHI leaks in code, commits, and branches.
AI-powered code security fix generator for developer workflows
AI-powered code security fix generator for developer workflows
Analyzes code commits & correlates with developer secure coding proficiency
Analyzes code commits & correlates with developer secure coding proficiency
Detects hardcoded secrets in code using semantic analysis & validation
Detects hardcoded secrets in code using semantic analysis & validation
ALM platform for governance, compliance, and traceability in software delivery
ALM platform for governance, compliance, and traceability in software delivery
Scans source code and containers for 130+ types of hardcoded secrets
Scans source code and containers for 130+ types of hardcoded secrets
Detects hardcoded secrets in code repos, commits, and containers
Detects hardcoded secrets in code repos, commits, and containers
Detects and prevents secrets leakage across the software development lifecycle
Detects and prevents secrets leakage across the software development lifecycle
A tool for searching a Git repository for interesting content
A command-line tool that scans textual data and Git history to identify and locate secrets, API keys, passwords, and other sensitive information.
A command-line tool that scans textual data and Git history to identify and locate secrets, API keys, passwords, and other sensitive information.
A tool that uses NLP and ML to identify potential software vulnerabilities from git commit messages
A tool that uses NLP and ML to identify potential software vulnerabilities from git commit messages
A pre-commit security tool that scans source code repositories to detect and prevent secrets like API keys, passwords, and credentials from being committed to version control systems.
A pre-commit security tool that scans source code repositories to detect and prevent secrets like API keys, passwords, and credentials from being committed to version control systems.
A collection of three tools for extracting, dumping, and scanning exposed .git repositories on websites to identify sensitive information and security vulnerabilities.
A collection of three tools for extracting, dumping, and scanning exposed .git repositories on websites to identify sensitive information and security vulnerabilities.
A bash-based framework for discovering and extracting exposed .git repositories from web servers during penetration testing and bug bounty activities.
A bash-based framework for discovering and extracting exposed .git repositories from web servers during penetration testing and bug bounty activities.
Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.
Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.
A collection of vulnerable web applications containing command injection flaws designed to test and evaluate detection and exploitation tools like commix.
A collection of vulnerable web applications containing command injection flaws designed to test and evaluate detection and exploitation tools like commix.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance