SecureStackCo / visualizing-software-supply-chain
A project to visualize the software supply chain
☆38Updated last year
Alternatives and similar repositories for visualizing-software-supply-chain:
Users that are interested in visualizing-software-supply-chain are comparing it to the libraries listed below
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆49Updated 2 weeks ago
- Holds the public Hacking the Cloud CTFs.☆53Updated 11 months ago
- ☆110Updated last year
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆32Updated last year
- boostsecurityio/lotp☆111Updated last month
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 5 months ago
- Maturity Model Collaborative project☆14Updated last year
- Protect against subdomain takeover☆92Updated 8 months ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆35Updated 3 years ago
- ☆10Updated 2 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆134Updated 3 weeks ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- A full insecure kubernetes application for testing security tools☆64Updated last week
- OWASP Foundation Web Respository☆42Updated 4 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆38Updated last month
- WAF bypass PoC☆46Updated last year
- Nuclei plugins to audit Chrome extensions☆64Updated 6 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated last year
- find dangling domains in a multi cloud environment☆138Updated this week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆98Updated 2 months ago
- DefectDojo Community Content☆17Updated 3 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆95Updated 2 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year