DefectDojo / Community-ContribsLinks
DefectDojo Community Content
☆18Updated 2 months ago
Alternatives and similar repositories for Community-Contribs
Users that are interested in Community-Contribs are comparing it to the libraries listed below
Sorting:
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 7 months ago
- Sharing software supply chain security open source projects☆53Updated 3 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Updated 2 months ago
- OWASP Foundation Web Respository☆56Updated 4 months ago
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆97Updated this week
- Add a layer of active defense to your cloud applications.☆103Updated last week
- Maturity Model Collaborative project☆15Updated 2 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Updated 2 years ago
- Visual Studio Code extension for writing Terrascan Rego policies☆22Updated last year
- ☆138Updated this week
- ☆10Updated 3 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Updated 3 months ago
- A web application to streamline the development of STIGs from SRGs☆83Updated 2 weeks ago
- Sample scan files for testing DefectDojo imports☆85Updated 5 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆171Updated this week
- Python API library for DefectDojo☆43Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 4 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Updated last month
- A tool to check the security settings of Github Organizations.☆75Updated 2 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆97Updated 11 months ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆47Updated 9 years ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- A project to visualize the software supply chain☆58Updated 2 years ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated 2 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- VMC: a Scalable, Open Source and Free Vulnerability Management Platform☆91Updated last year
- The Auditree framework tool to run compliance control checks as unit tests.☆71Updated last year
- Fork Threat Modeling Platform - Community☆27Updated 3 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year
- Stakeholder-Specific Vulnerability Categorization☆170Updated last week