Checkmarx / ast-cliLinks
A CLI project wrapping application security testing (AST) APIs
☆58Updated this week
Alternatives and similar repositories for ast-cli
Users that are interested in ast-cli are comparing it to the libraries listed below
Sorting:
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆106Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 3 months ago
- Software Component Verification Standard (SCVS)☆150Updated 6 months ago
- Security scanning & static analysis tool☆94Updated 11 months ago
- OWASP Kubernetes Security Testing Guide☆38Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆95Updated 8 months ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Updated 3 years ago
- OWASP Foundation Web Respository☆56Updated this week
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆156Updated last year
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆108Updated 10 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Updated last year
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆32Updated this week
- Checkmarx Scan and Result Orchestration☆101Updated 2 weeks ago
- OWASP Foundation Web Respository☆98Updated 8 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 10 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆51Updated this week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆73Updated last year
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆66Updated 3 months ago
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- ☆88Updated 8 months ago
- Core model including reused documentation☆99Updated 4 months ago
- OWASP Low-Code/No-Code Top 10☆74Updated 3 months ago
- Container Security Verification Standard☆58Updated 6 years ago
- ☆124Updated last year
- OWASP Benchmark Project Utilities - Provides scorecard generation and crawling tools for Benchmark style test suites.☆18Updated this week
- A Python client for the Snyk API.☆101Updated last year
- ☆123Updated 3 weeks ago
- Protect against subdomain takeover☆94Updated 2 months ago