A project to visualize the software supply chain
☆58Sep 9, 2023Updated 2 years ago
Alternatives and similar repositories for visualizing-software-supply-chain
Users that are interested in visualizing-software-supply-chain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 8 months ago
- Common Exercise Format - CEXF☆11Aug 15, 2024Updated last year
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Mar 21, 2026Updated last month
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆24Mar 2, 2026Updated last month
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,041Dec 21, 2024Updated last year
- Simplified version of a common crawl fetcher☆17Dec 24, 2025Updated 4 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- CLI tool to validate CVE v5 JSON records.☆13May 14, 2025Updated 11 months ago
- A collection of packages for using GitHub security advisories in Node.js.☆18Updated this week
- ACT documentation repo☆17May 22, 2024Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- This unique variation on Thinking Claude maps Claude's thought process steps to unicode and forces Claude to think in unicode, potentiall…☆17Feb 24, 2025Updated last year
- source code for the offsecml framework☆44Jun 6, 2024Updated last year
- Continuous build system used by Mono and Moonlight.☆34Apr 8, 2020Updated 6 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆42Apr 1, 2026Updated 3 weeks ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Software in this repository is not maintained anymore☆11Jul 6, 2022Updated 3 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Apr 21, 2023Updated 3 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆41Jan 25, 2026Updated 3 months ago
- Secure cursor rules following the R.A.I.L.G.U.A.R.D Framework☆13Apr 21, 2025Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 4 years ago
- ☆17Jun 20, 2023Updated 2 years ago
- ☆44Dec 12, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- ☆50Updated this week
- Grafana Docker Image for use with Red Hat OpenShift☆21Apr 30, 2019Updated 6 years ago
- OWASP Foundation web repository☆18Oct 11, 2025Updated 6 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆98Feb 11, 2025Updated last year
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Apr 18, 2026Updated last week
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago