DefectDojo / Community-ContribsLinks
DefectDojo Community Content
☆18Updated last week
Alternatives and similar repositories for Community-Contribs
Users that are interested in Community-Contribs are comparing it to the libraries listed below
Sorting:
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 4 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Updated this week
- Sample scan files for testing DefectDojo imports☆84Updated 2 months ago
- Sharing software supply chain security open source projects☆52Updated 2 years ago
- OWASP Foundation Web Respository☆56Updated last month
- ☆127Updated 2 weeks ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Computer Aided Integration of Requirements and Information Security - Server☆165Updated 2 weeks ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- EPSS(Exploit Prediction Scoring System) API client☆19Updated 3 weeks ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated last year
- Python API library for DefectDojo☆43Updated 2 years ago
- The Auditree framework tool to run compliance control checks as unit tests.☆71Updated last year
- ☆10Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- AI based Secrets Detection Python Framework☆62Updated 5 months ago
- Add a layer of active defense to your cloud applications.☆97Updated this week
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆207Updated last week
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆40Updated 5 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 11 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆131Updated 3 months ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project…☆110Updated last year
- OWASP Threat Dragon core files☆29Updated 4 years ago
- A project to visualize the software supply chain☆54Updated 2 years ago
- OWASP Foundation Web Respository☆72Updated last month
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated last week
- An open-source collection of API key rotation tutorials.☆74Updated 2 months ago
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆98Updated last month