Checkmarx / ast-cli
A CLI project wrapping application security testing (AST) APIs
☆47Updated this week
Alternatives and similar repositories for ast-cli:
Users that are interested in ast-cli are comparing it to the libraries listed below
- Checkmarx Scan and Result Orchestration☆91Updated this week
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆49Updated last week
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- NextJS-based single-page application for completing and reviewing SAMM assessments☆70Updated last year
- OWASP Foundation Web Respository☆81Updated last month
- ☆93Updated this week
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 3 months ago
- Software Component Verification Standard (SCVS)☆140Updated 10 months ago
- OWASP Foundation Web Respository☆54Updated last year
- OWASP Kubernetes Security Testing Guide☆37Updated 5 months ago
- Exports vulnerability scan data from the Checkmarx SAST platform for use in analytical tools.☆19Updated 3 months ago
- Threat Modeling Manifesto☆27Updated 7 months ago
- OWASP Code Review Guide Web Repository☆129Updated 2 years ago
- Checkmarx Python SDK☆27Updated this week
- OWASP Foundation Web Respository☆27Updated 6 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- OWASP Threat Dragon core files☆11Updated 6 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆54Updated last week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆62Updated 8 months ago
- OWASP Foundation Web Respository☆63Updated last year
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- A full insecure kubernetes application for testing security tools☆66Updated this week
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 2 months ago
- Container Security Verification Standard☆58Updated 5 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated last week
- ☆32Updated 2 years ago
- Awesome resources about Security in Kubernetes☆41Updated 2 years ago
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆41Updated 8 months ago
- ☆122Updated last year