WARNING: the program is still in development and not stable even though it's on version 1.x.y. Use at your own risk.* Clinv DevSecOps command line asset inventory Help See documentation for more details. Installing pip install clinv Contributing For guidance on setting up a development environment, and how to make a contribution to clinv, see Contributing to clinv. Donations or If you are using some of my open-source tools, have enjoyed them, and want to say "thanks", this is a very strong way to do it. If your product/company depends on these tools, you can sponsor me to ensure I keep happily maintaining them. If these tools are helping you save money, time, effort, or frustrations; or they are helping you make money, be more productive, efficient, secure, enjoy a bit more your work, or get your product ready faster, this is a great way to show your appreciation. Thanks for that! And by sponsoring me, you are helping make these tools, that already help you, sustainable and healthy. License GPLv3
FEATURES
ALTERNATIVES
A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.
A project that uses Athena and EventBridge to investigate API activity and notify of actions for incident response and misconfiguration detection.
Workflows for Shuffle automation tool with structured categories and customization options.
Catalyst is a SOAR system that automates alert handling and incident response processes, adapting to your workflows and being open source.
A DFIR console integrating various cybersecurity tools and frameworks for efficient incident response.
A security operations platform that provides automated threat detection, access control, and protection against various online attacks through Cloudflare integration.
CBRX is a cloud-based platform that automates incident analysis and reporting for cybersecurity teams.
Malware allows attackers to execute Windows commands from a remote environment
PINNED

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.