SAP / credential-digger
A Github scanning tool that identifies hardcoded credentials while filtering the false positive data through machine learning models
☆318Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for credential-digger
- Software Component Verification Standard (SCVS)☆134Updated 6 months ago
- threatspec - continuous threat modeling, through code☆332Updated 3 years ago
- Benchmarking repo for secrets scanning☆229Updated 2 months ago
- Open Source Vulnerability schema.☆185Updated last week
- Proof of concept code for Datadog Security Labs referenced exploits.☆417Updated last year
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆52Updated last year
- OWASP Foundation Web Respository☆64Updated last year
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆183Updated last year
- AI based Secrets Detection Python Framework☆59Updated last month
- ☆121Updated last year
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆180Updated 3 months ago
- Scan DockerHub images that match a keyword to find secrets.☆54Updated 3 years ago
- A community collection of security reviews of open source software components.☆92Updated 8 months ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆148Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆125Updated 9 months ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆174Updated 3 months ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆699Updated 2 months ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.☆105Updated 2 weeks ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆165Updated 5 months ago
- Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git☆79Updated last week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆86Updated 9 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.0, purl, and vers…☆96Updated this week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆61Updated 5 months ago
- ☆18Updated last year
- OWASP Foundation Web Respository☆27Updated 2 months ago
- ☆555Updated 3 years ago
- ☆110Updated last year
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆247Updated this week
- Agile Threat Modeling Toolkit☆615Updated this week