SecureStackCo / visualizing-software-supply-chain
A project to visualize the software supply chain
☆35Updated last year
Related projects ⓘ
Alternatives and complementary repositories for visualizing-software-supply-chain
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆43Updated 10 months ago
- Maturity Model Collaborative project☆13Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 2 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆97Updated 9 months ago
- boostsecurityio/lotp☆100Updated 7 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- Protect against subdomain takeover☆92Updated 5 months ago
- OWASP Foundation Web Respository☆37Updated 2 months ago
- Holds the public Hacking the Cloud CTFs.☆49Updated 8 months ago
- ☆151Updated 2 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆48Updated this week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆57Updated last year
- ☆109Updated last year
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆48Updated 8 months ago
- WAF bypass PoC☆43Updated last year
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆37Updated this week
- Blogpost series showcasing interesting cloud - web app security bugs☆45Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆76Updated 3 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆82Updated last month
- Nuclei plugins to audit Chrome extensions☆64Updated 3 months ago
- LLM Testing Findings Templates☆65Updated 8 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- https://breaches.cloud☆36Updated 3 weeks ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆36Updated 2 years ago
- ☆28Updated 3 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 4 months ago