SecureStackCo / visualizing-software-supply-chain
A project to visualize the software supply chain
☆39Updated last year
Alternatives and similar repositories for visualizing-software-supply-chain:
Users that are interested in visualizing-software-supply-chain are comparing it to the libraries listed below
- boostsecurityio/lotp☆112Updated this week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 8 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated last week
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 6 months ago
- ☆110Updated last year
- Protect against subdomain takeover☆93Updated 9 months ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆46Updated this week
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- A tool to uncover undocumented APIs from the AWS Console.☆95Updated 3 months ago
- Holds the public Hacking the Cloud CTFs.☆55Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated last month
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 3 months ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆37Updated 3 years ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆38Updated 2 months ago
- A full insecure kubernetes application for testing security tools☆68Updated this week
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆81Updated 3 years ago
- WAF bypass PoC☆46Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 2 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- Scans every git push to your Github organisations to find unwanted secrets.☆88Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆102Updated last year
- ☆10Updated 2 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆103Updated 3 months ago