SecureStackCo / actions-exposureLinks
A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
☆27Updated 2 years ago
Alternatives and similar repositories for actions-exposure
Users that are interested in actions-exposure are comparing it to the libraries listed below
Sorting:
- ☆131Updated this week
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆14Updated 3 years ago
- An open-source collection of API key rotation tutorials.☆75Updated 3 months ago
- The Secure Coding Framework☆22Updated 5 years ago
- ☆63Updated 6 months ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆31Updated 2 years ago
- Core model including reused documentation☆99Updated 6 months ago
- The source files and tools needed to build the OWASP Cornucopia decks in various languages☆85Updated this week
- OWASP Foundation Web Respository☆31Updated 2 months ago
- OWASP Project Developer Guide - Document and Project Web pages☆114Updated this week
- DefectDojo Community Content☆18Updated last month
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 3 years ago
- CLI component of OWASP PurpleTeam☆133Updated 2 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆214Updated this week
- A comprehensive scanner for Google Cloud☆342Updated 2 weeks ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- ☆37Updated 9 months ago
- A project to visualize the software supply chain☆55Updated 2 years ago
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆21Updated 10 months ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆69Updated last week
- AI Security Shared Responsibility Model☆85Updated 2 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 5 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆29Updated 4 months ago
- Runs a scan using Dastardly by Burp Suite against a target site and creates a JUnit XML report for the scan on completion.☆292Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Updated last year
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆41Updated 8 months ago
- Red Teaming for AI and Cloud☆199Updated 2 weeks ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆82Updated last year
- InfoSec OpenAI Examples☆19Updated 2 years ago
- The security workflow engine!☆135Updated last month