SecureStackCo / actions-abom
SecureStack Application Bill of Materials (ABOM/SBOM)
☆13Updated 2 years ago
Alternatives and similar repositories for actions-abom:
Users that are interested in actions-abom are comparing it to the libraries listed below
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆15Updated 2 years ago
- A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition …☆22Updated 2 years ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆30Updated last year
- All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!☆21Updated last year
- A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureS…☆24Updated last year
- A GitHub Action that creates a SBOM from your application so you can meet compliance and security requirements. Add this to your dev, sta…☆25Updated last year
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆17Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆17Updated 6 months ago
- A GitHub Actions Supply Chain CTF / Goat☆17Updated last week
- OWASP ASVS Security Evaluation Templates with Nuclei☆28Updated this week
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆25Updated 2 years ago
- ☆42Updated 8 months ago
- ☆38Updated 9 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆22Updated 7 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated this week
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 2 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Additional active scan checks for BURP☆26Updated 4 months ago
- Maturity Model Collaborative project☆14Updated last year
- ☆13Updated last year
- ☆20Updated last year
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆26Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 7 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆30Updated 2 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- Analysis of the Enterprise SAST/DAST product landscape☆36Updated 11 months ago