SecureStackCo / actions-abomLinks
SecureStack Application Bill of Materials (ABOM/SBOM)
☆13Updated 2 years ago
Alternatives and similar repositories for actions-abom
Users that are interested in actions-abom are comparing it to the libraries listed below
Sorting:
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆15Updated 3 years ago
- A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition …☆22Updated 3 years ago
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆20Updated last year
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆31Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Dependency Combobulator☆93Updated last year
- All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!☆21Updated 2 years ago
- OWASP ASVS Security Evaluation Templates with Nuclei☆36Updated last month
- ☆17Updated 3 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 3 weeks ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- ☆90Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- A tool to monitor for potential spear phishing domains and send to Slack.☆22Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- WAF bypass PoC☆48Updated last year
- Additional active scan checks for BURP☆27Updated 9 months ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆27Updated 2 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆24Updated 2 months ago
- AI Powered Sensitive Information Detection☆19Updated last year
- An example of a mis-configured Rails application release under MIT license.☆20Updated 2 years ago
- Go module that returns supported regions for a service or supported services for a region☆16Updated last year
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated 11 months ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆23Updated last month
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month
- Virtual Security Operations Center☆51Updated last year
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago