SecureStackCo / actions-exposureLinks
A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
☆27Updated 2 years ago
Alternatives and similar repositories for actions-exposure
Users that are interested in actions-exposure are comparing it to the libraries listed below
Sorting:
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆15Updated 3 years ago
- ☆127Updated 3 weeks ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆31Updated 2 years ago
- ☆63Updated 5 months ago
- AI based Secrets Detection Python Framework☆62Updated 5 months ago
- The Secure Coding Framework☆22Updated 5 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 5 months ago
- Core model including reused documentation☆99Updated 5 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆138Updated last year
- ☆14Updated 2 years ago
- OWASP Project Developer Guide - Document and Project Web pages☆114Updated this week
- The source files and tools needed to build the OWASP Cornucopia decks in various languages☆84Updated this week
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆21Updated 9 months ago
- A GitHub Action that creates a SBOM from your application so you can meet compliance and security requirements. Add this to your dev, sta…☆25Updated 2 years ago
- VMC: a Scalable, Open Source and Free Vulnerability Management Platform☆91Updated 10 months ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆38Updated 9 months ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 2 months ago
- OWASP Foundation Web Respository☆16Updated 3 years ago
- The dependency-check repository has moved:☆36Updated last month
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆49Updated 4 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆212Updated this week
- OWASP Foundation Web Respository☆82Updated last week
- A fun POC that is built to understand AI security agents.☆34Updated 3 weeks ago
- CLI component of OWASP PurpleTeam☆131Updated last year
- Falcon Integration Gateway (FIG)☆21Updated 3 weeks ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 8 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated 2 years ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆56Updated 2 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago