OWASP / cwe-sdk-javascript
A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC
☆33Updated 2 months ago
Alternatives and similar repositories for cwe-sdk-javascript:
Users that are interested in cwe-sdk-javascript are comparing it to the libraries listed below
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆55Updated 6 months ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆46Updated 2 years ago
- Listo. Use questionnaires and checklists to make it easy to do the right thing, regarding the software you build.☆28Updated last year
- A documentation and tracking project with the goal of making package management systems more secure.☆50Updated 4 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 3 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 10 months ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆14Updated 2 years ago
- ☆98Updated last week
- ☆38Updated 2 weeks ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- OWASP Foundation Web Respository☆28Updated 6 months ago
- Threat Modeling Manifesto☆27Updated 7 months ago
- ZAP Management Scripts☆23Updated this week
- A zoo for malicious NPM packages☆20Updated 2 years ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- Tools for AWS forensics☆64Updated 9 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- A curated list of security tools for Hackers & Builders!☆98Updated 7 months ago
- Dependency Combobulator☆92Updated last year
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last week
- Generate a personal Jekyll website using your Bibtex references.☆11Updated 5 years ago
- Kubernetes Security Testing Guide☆26Updated 10 months ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- ☆18Updated 4 years ago
- ☆11Updated 8 years ago
- The Secure Coding Framework☆21Updated 4 years ago
- Inject JS to the DOM to find vulnerable JavaScript libraries☆10Updated 5 months ago
- Security advisories for Node.js and the JavaScript ecosystem.☆41Updated 3 years ago
- Fast and multi-purpose DNS toolkit allow to run multiple DNS queries.☆9Updated 2 years ago