Software Supply Chain Security

Software supply chain security is all about making sure the code and tools you rely on—like open-source packages, third-party services, and build pipelines—haven’t been tampered with. These days, attackers don’t always go after your code directly; instead, they look for weak links in the systems you trust. That might mean sneaking something malicious into a dependency or slipping into your CI/CD process. Securing the software supply chain means keeping a close eye on what goes into your product, verifying where it comes from, and making sure nothing unexpected gets added along the way. It’s about building with confidence, knowing the foundation is solid.

Upcoming Trainings

Attacking the Software Supply Chain BlackHat ASIA 2026

21 April 202622 April 2026
Singapore
bh-asia-26-2

Community Contributions

  • GHNavigator: Repository Browser & Token Analyzer
    GHNavigator: Repository Browser & Token Analyzer
    Software Supply Chain Security
  • keychecker : SSH Key analysis tool
    keychecker : SSH Key analysis tool
    Software Supply Chain Security
  • 3P Tracer
    3P Tracer
    Cloud, Software Supply Chain Security
  • SBOM Play
    SBOM Play
    Software Supply Chain Security
GHNavigator: Repository Browser & Token Analyzer

GHNavigator is a client-side browser-based tool designed to simplify exploring GitHub repositories and analyzing Personal Access Tokens (PATs). It works entirely in your browser without requiring any server dependencies, ensuring tokens never leave your session.

Key Capabilities

  • Repository Browser: Navigate through repositories with an intuitive interface, view file structures, and group repos by organization.

  • Token Analyzer: Validate token scopes, perform repo enumeration, and run bulk token checks securely.

Who Can Benefit

  • Security Teams: Validate PATs and map repository access safely.

  • Developers & DevOps: Manage and test tokens with clear visibility into their scope.

  • Bug Bounty Hunters: Investigate and validate leaked tokens without risking exposure.

  • Researchers: Explore repository structures and API behaviors efficiently.

Getting Started

👉 Try it live: GHNavigator GitHub Pages

Alternative Option

  1. Clone the repository:

    git clone https://github.com/cyfinoid/ghnavigator.git
  2. Open index.html in your browser.

  3. Enter a GitHub token and begin exploring.

Security Considerations

  • Tokens remain in your browser session only.

  • No backend servers or tracking involved.

  • Built with GitHub REST API v3 best practices.

Categories :
Software Supply Chain Security
enum
enum
keychecker : SSH Key analysis tool

🔑 Fast CLI to fingerprint SSH private keys and identify which Git hosting accounts they unlock.

KeyChecker analyzes a private key locally and validates it against popular Git hosting services to recover mapped usernames, detect weak keys, and optionally probe for private repositories with a wordlist. Everything runs on your machine.

Links

PyPI: https://pypi.org/project/keychecker/

Source: https://github.com/cyfinoid/keychecker

Categories :
Software Supply Chain Security
header
header
3ptracer
3ptracer
3P Tracer

🕵️‍♂️ Discover who a domain really talks to — with zero data leaving your browser.

3ptracer is a browser-first, privacy-focused reconnaissance tool that gives you deep visibility into third-party services used by any domain.

With 3ptracer, you can:

Run comprehensive DNS analysis: Perform live DoH queries and fetch multiple record types (A, AAAA, MX, NS, TXT, CNAME)
Dig into Certificate Transparency logs: Identify shadow subdomains and historical usage
Detect service providers: Automatically spot CDNs, DNS providers, cloud hosting, email services, and security solutions
Analyze security posture: Check for misconfigured DMARC/SPF/DMKIM, and general risk indicators
Visualize the web of dependencies: Get CNAME mappings, service categories, subdomain discovery stats, and historical patterns

Why it stands out:

🧠 Works fully in the browser
🔐 No data leaves your machine
📡 Real-time DNS resolution and fingerprinting
🖥️ No API keys, no shared rate limits
🌐 Built for OSINT investigators, security teams, and curious developers

Check it out: https://cyfinoid.github.io/3ptracer/
Source Code: https://github.com/cyfinoid/3ptracer

This is just the beginning. Explore it, break it, and tell us what you’d like to see next.

Categories :
Cloud, Software Supply Chain Security
sbom-play-banner
sbom-play-banner
dependencies
dependencies
global-dashboard
global-dashboard
license-compliance
license-compliance
vuln-details
vuln-details
vulnerability-view
vulnerability-view
SBOM Play

🚀 Introducing SBOM Play – your privacy-conscious SBOM explorer!

🔍 A lightweight, browser-based SBOM viewer that adds vulnerability insights, license analysis, and cross-repo visibility—all while keeping your data private.

With SBOM Play, you can:
✅ Visualize third-party dependencies across all your repositories
✅ Identify heavily reused dependencies (major/minor breakdown)
✅ Flag missing or incompatible licenses in your dependencies
✅ Get similar insights about your vendors’ dependencies
✅ Understand which components are most affected by known vulnerabilities
✅ Even compare these patterns across multiple organizations if you work with federated SBOMs

🧠 Bonus: It runs fully in the browser
🖥️ No server setup
🔐 No data leaves your machine
📦 LocalStorage for session data
🔍 Fully open source (inspect, fork, or self-host)

Check it out: https://cyfinoid.github.io/sbomplay/

Source Code : https://github.com/cyfinoid/sbomplay

We’re just getting started. Try it out and let us know what features you want next.

Categories :
Software Supply Chain Security

Previous Training Sessions

Attack and Defend Software Supply Chain DEFCON Trainings 2025

11 August 202512 August 2025
Las Vegas, USA
SSCS-logo-square

Attacking CI/CD Environments BruCON Trainings

24 April 202525 April 2025
Online
brucon-2025

Attack & Defend Software Supply Chains Nullcon 2025

3 March 20255 March 2025
Goa, India
nullcon-training-2025

Attacking CI CD Environments Nullcon Hyderabad 24

2 May 20244 May 2024
Hyderabad, India
1710245049783

Attack & Defend Software Supply Chain BlackHat Asia

16 April 202417 April 2024
Online
bh-asia-supply-chain-final

Beyond the Code : Securing your software supply chain c0c0n 2023

4 October 20235 October 2023
Kochi, India
F2g7MqrbsAAMr2G
Scroll to Top