SecureStackCo / actions-exposureLinks
A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
☆24Updated 2 years ago
Alternatives and similar repositories for actions-exposure
Users that are interested in actions-exposure are comparing it to the libraries listed below
Sorting:
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆15Updated 3 years ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆31Updated 2 years ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 2 years ago
- A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition …☆22Updated 3 years ago
- All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!☆21Updated 2 years ago
- A GitHub Action that creates a SBOM from your application so you can meet compliance and security requirements. Add this to your dev, sta…☆24Updated 2 years ago
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆38Updated 3 months ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆38Updated 3 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Golang installer for DefectDojo☆28Updated 5 months ago
- OWASP Foundation Web Respository☆28Updated 10 months ago
- OWASP Foundation Web Respository☆10Updated 2 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆23Updated last month
- ☆15Updated last month
- The Secure Coding Framework☆22Updated 5 years ago
- Source code for the Binaries of OWASP WrongSecrets☆11Updated this week
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆19Updated last year
- Github action to generate BoM and upload to OWASP dependency track for vulnerability analysis☆42Updated 9 months ago
- ☆41Updated 4 months ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 3 years ago
- The OWASP Amass Homebrew Formula☆16Updated last year
- An open-source collection of API key rotation tutorials.☆70Updated 3 months ago
- ☆14Updated 2 years ago
- DLT-Security-Framework☆17Updated 4 years ago