Checkmarx / ast-cli
A CLI project wrapping application security testing (AST) APIs
☆51Updated this week
Alternatives and similar repositories for ast-cli
Users that are interested in ast-cli are comparing it to the libraries listed below
Sorting:
- Checkmarx Scan and Result Orchestration☆96Updated this week
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆37Updated 3 years ago
- NextJS-based single-page application for completing and reviewing SAMM assessments☆72Updated 2 years ago
- ☆105Updated 2 weeks ago
- Exports vulnerability scan data from the Checkmarx SAST platform for use in analytical tools.☆19Updated 6 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆64Updated 10 months ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 5 months ago
- Software Component Verification Standard (SCVS)☆144Updated last month
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 4 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated this week
- Checkmarx Python SDK☆28Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆133Updated last year
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆58Updated 2 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 11 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆100Updated last year
- OWASP Kubernetes Security Testing Guide☆37Updated 8 months ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated this week
- ☆63Updated 3 months ago
- A project to visualize the software supply chain☆50Updated last year
- A comprehensive list of software composition analysis tools.☆146Updated 11 months ago
- OWASP Foundation Threat Dragon Project Web Repository☆80Updated last week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆114Updated last week
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated 2 months ago
- Protect against subdomain takeover☆92Updated 11 months ago
- threatspec - continuous threat modeling, through code☆357Updated 4 years ago
- OWASP Foundation Web Respository☆28Updated 8 months ago