Mobile-IoT-Security-Lab / GHASTLinks
GitHub Actions Security Tester
☆12Updated 2 years ago
Alternatives and similar repositories for GHAST
Users that are interested in GHAST are comparing it to the libraries listed below
Sorting:
- A community collection of security reviews of open source software components.☆95Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 5 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated 2 months ago
- A place to systematically store software bill of materials (SBOM) documents.☆46Updated 2 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated 2 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆135Updated last year
- ☆111Updated 2 years ago
- ☆17Updated 3 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆122Updated 4 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- Development of the NIST vulnerability data ontology (Vulntology).☆39Updated last month
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆53Updated last month
- Global Security Database Tools☆43Updated last year
- Dependency Combobulator☆93Updated last year
- OWASP Top 10 Infrastructure Security Risks☆36Updated 3 weeks ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated last year
- sbomify is a product security artifact management platform.☆24Updated this week
- Labeled vulnerability-package match pairs used as ground truth to evaluate vulnerability scanners☆11Updated 3 weeks ago
- using ML models for red teaming☆43Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 4 months ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 3 months ago
- Manager of third-party sources of Semgrep rules 🗂☆87Updated 11 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆121Updated this week
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- A curated list of argument injection vectors☆41Updated 5 months ago