MaibornWolff / dd-import
A utility to (re-)import findings and language data into DefectDojo
☆42Updated 3 months ago
Alternatives and similar repositories for dd-import:
Users that are interested in dd-import are comparing it to the libraries listed below
- Discover vulnerabilities and container image misconfiguration in production environments.☆54Updated this week
- OWASP Foundation Web Respository☆81Updated 4 months ago
- Protect against subdomain takeover☆93Updated 7 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆35Updated 4 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆59Updated 6 months ago
- A deliberately vulnerable Kubernetes cluster☆120Updated last year
- OWASP Kubernetes Security Testing Guide☆37Updated 4 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆82Updated this week
- boostsecurityio/poutine☆243Updated last week
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 4 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆218Updated 4 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated 11 months ago
- A full insecure kubernetes application for testing security tools☆64Updated last week
- boostsecurityio/lotp☆110Updated last month
- OWASP Kubernetes security and compliance tool [WIP]☆105Updated last year
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆109Updated this week
- Curating Falco rules with MITRE ATT&CK Matrix☆77Updated 10 months ago
- Dynamic Application and API Security Testing☆190Updated last year
- ☆171Updated last month
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated 3 months ago
- Curated list of security tools☆64Updated last year
- A tool for preventing the installation of malicious PyPI and npm packages☆108Updated last month
- The security workflow engine!☆91Updated this week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆38Updated last year
- ☆161Updated 4 months ago
- ☆92Updated 8 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆105Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆89Updated 11 months ago