A project to visualize the software supply chain
☆58Sep 9, 2023Updated 2 years ago
Alternatives and similar repositories for visualizing-software-supply-chain
Users that are interested in visualizing-software-supply-chain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 7 months ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Updated this week
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Aug 30, 2018Updated 7 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Mar 2, 2026Updated 3 weeks ago
- ☆16Mar 17, 2026Updated last week
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,038Dec 21, 2024Updated last year
- Simplified version of a common crawl fetcher☆17Dec 24, 2025Updated 3 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- A rewrite of the popular altDNS subdomain tool by @infosec-au☆12Feb 28, 2019Updated 7 years ago
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Jan 21, 2026Updated 2 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆119Mar 15, 2026Updated last week
- A collection of packages for using GitHub security advisories in Node.js.☆18Updated this week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- ACT documentation repo☆18May 22, 2024Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- source code for the offsecml framework☆45Jun 6, 2024Updated last year
- List of helpful tools for every CTF Category☆19May 2, 2017Updated 8 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Continuous build system used by Mono and Moonlight.☆34Apr 8, 2020Updated 5 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Dec 2, 2025Updated 3 months ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Updated this week
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Software in this repository is not maintained anymore☆11Jul 6, 2022Updated 3 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Apr 21, 2023Updated 2 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆36Jan 25, 2026Updated last month
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 9 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- ☆192Apr 16, 2025Updated 11 months ago
- ☆18Jun 20, 2023Updated 2 years ago
- ☆43Dec 12, 2024Updated last year
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago