SecureStackCo / visualizing-software-supply-chainLinks
A project to visualize the software supply chain
☆52Updated last year
Alternatives and similar repositories for visualizing-software-supply-chain
Users that are interested in visualizing-software-supply-chain are comparing it to the libraries listed below
Sorting:
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 11 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 5 months ago
- ☆111Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 9 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆80Updated 3 weeks ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- boostsecurityio/lotp☆126Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 2 months ago
- ☆54Updated this week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 3 months ago
- ☆183Updated last month
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated 5 months ago
- ☆41Updated 3 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- ☆36Updated 10 months ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆68Updated 3 weeks ago
- LLM Testing Findings Templates☆72Updated last year
- ☆178Updated last month
- ☆10Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 4 months ago
- Protect against subdomain takeover☆92Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated last month
- Manager of third-party sources of Semgrep rules 🗂☆86Updated 10 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆36Updated last week
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- Fork Threat Modeling Platform - Community☆20Updated last month
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆35Updated 3 months ago