OWASP / cwe-sdk-javascript
A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC
☆32Updated last month
Related projects: ⓘ
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆54Updated 2 weeks ago
- ☆76Updated this week
- ☆39Updated 4 years ago
- Listo. Use questionnaires and checklists to make it easy to do the right thing, regarding the software you build.☆28Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 4 months ago
- Security advisories for Node.js and the JavaScript ecosystem.☆41Updated 3 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆48Updated 3 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆14Updated last year
- Threat Modeling Manifesto☆24Updated 2 months ago
- Maturity Model Collaborative project☆13Updated last year
- Fast and simple way to check any HTTP Headers☆45Updated last year
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆49Updated 3 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated last year
- OWASP Threat Dragon with Gitlab Integration☆24Updated 6 years ago
- ZAP Management Scripts☆20Updated last week
- ☆20Updated 5 years ago
- ☆54Updated 11 months ago
- ☆11Updated 7 years ago
- Open Security Summit 2019☆24Updated 3 years ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆36Updated 2 years ago
- A developer-friendly secrets detection tool for CI and pre-commit hooks based on Yelp's detect-secrets☆48Updated 2 years ago
- Dependency Combobulator☆85Updated 8 months ago
- TSLint rules for Angular☆18Updated 5 years ago
- OWASP Foundation Web Respository☆26Updated 3 weeks ago
- A zoo for malicious NPM packages☆19Updated last year
- Generate a personal Jekyll website using your Bibtex references.☆10Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 7 months ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆61Updated 5 years ago
- Security scanning & static analysis tool☆92Updated last year