shellfirm will intercept any risky patterns and immediately prompt a small challenge that will double verify your action, think of it as a captcha for your terminal. How does it work? shellfirm will evaluate all the shell commands behind the scenes. If a risky pattern is detected, you will immediately get a prompt with the relevant warning to verify your command. Example Setup: - Install via brew: brew tap kaplanelad/tap && brew install shellfirm - Or download the binary file from releases page, unzip the file and move to /usr/local/bin folder. - Validate shellfirm installation: shellfirm --version - Verify installation: mkdir /tmp/shellfirm cd /tmp/shellfirm git reset --hard - Select your shell: Oh My Zsh - Download zsh plugin: curl https://raw.github
FEATURES
SIMILAR TOOLS
SecGen creates vulnerable virtual machines and hacking challenges for learning security penetration testing techniques.
An open-source artifact metadata API for managing metadata about software resources and governing the software supply chain.
A comprehensive server cryptographic protocol analyzer with API and CLI interface.
Certificate Transparency Monitor that alerts you when an SSL/TLS certificate is issued for your domains.
A tool for SSH server auditing with comprehensive analysis capabilities.
An easy-to-use and lightweight API wrapper for Censys APIs with support for Python 3.8+.
Directory containing components to build labs for Chapter 29 with setup instructions and VM information.
A tool for scraping CTF writeups from ctftime.org and organizing them for easy access.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.