OWASP SonarQube Project
☆112Aug 22, 2019Updated 6 years ago
Alternatives and similar repositories for sonarqube
Users that are interested in sonarqube are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Integrates OWASP Zed Attack Proxy reports into SonarQube☆74Jul 19, 2025Updated 8 months ago
- ☆21Sep 25, 2018Updated 7 years ago
- ☆92Aug 15, 2020Updated 5 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 8 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🚨 Slack bot for cyber-security phishing☆21Jan 22, 2019Updated 7 years ago
- SAMM stands for Software Assurance Maturity Model.☆397May 17, 2022Updated 3 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- Official OSSEC docker container☆14Jun 11, 2021Updated 4 years ago
- ☆16Apr 7, 2021Updated 5 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆15Apr 25, 2015Updated 10 years ago
- Jenkins Docker image to use easilty with volume mounts☆13Dec 18, 2016Updated 9 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Container Security Verification Standard☆59Aug 27, 2019Updated 6 years ago
- GitOps workflow for managing app delivery on multiple clusters☆23Oct 1, 2019Updated 6 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- This is a container of web applications that work with OWASP Bug Bounty for Projects☆34Apr 28, 2025Updated 11 months ago
- Relay Workflows☆11Aug 24, 2022Updated 3 years ago
- Demo to deploy an entire microservices application along with EKS cluster☆17Oct 9, 2020Updated 5 years ago
- Some resources to facilitate my blog on auditd for security monitoring☆13Mar 23, 2023Updated 3 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Aug 10, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago
- Generate Software Bill of Materials for R Things☆20Feb 9, 2024Updated 2 years ago
- A script that inspects multi-byte character sets looking for characters with specific user-defined properties☆28Jun 23, 2016Updated 9 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- Integrates Dependency-Check reports into SonarQube☆689Oct 20, 2025Updated 5 months ago
- Resources for Code Cafe Online 4th May 2020☆11May 5, 2020Updated 5 years ago
- DEPRECATED. A command line tool to allow users to log into AWS with their federated identity using Single Sign On and obtain ephemeral AP…☆19Aug 18, 2023Updated 2 years ago
- ☆24Dec 6, 2015Updated 10 years ago
- OWASP Testing Guide☆111Jan 27, 2016Updated 10 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- cloud.gov security policies and procedures☆27Mar 5, 2026Updated last month
- OWASP Learning Gateway Project☆14Apr 18, 2023Updated 2 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 5 months ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Measure release insights and recommendations for open-source dependencies. Note: this project is archived.☆10Jan 3, 2023Updated 3 years ago
- ☆68Aug 1, 2017Updated 8 years ago
- GitHub action to generate a CycloneDX SBOM for .NET☆12Jul 15, 2025Updated 8 months ago