ShiftLeftSecurity / scan-docsLinks
☆27Updated 3 years ago
Alternatives and similar repositories for scan-docs
Users that are interested in scan-docs are comparing it to the libraries listed below
Sorting:
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 3 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- ☆10Updated 3 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆47Updated this week
- ZAP Management Scripts☆23Updated last week
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Updated 4 years ago
- Dependency Combobulator☆94Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- A Security Scanner for Go☆26Updated 6 years ago
- Offensive Terraform Website☆45Updated 5 years ago
- ☆74Updated 5 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- A curated list of security tools for Hackers & Builders!☆98Updated last year
- Kubernetes Pwnage for all☆56Updated 5 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 7 years ago
- Golang installer for DefectDojo☆29Updated 11 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- ☆27Updated 2 months ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆32Updated 3 weeks ago
- Assorted tools for security-related task for git repositories☆58Updated 3 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 2 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 9 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated 2 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 5 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- Docker Secure Computing Profile Generator☆49Updated 4 years ago
- A very vulnerable implementation of a GraphQL API.☆17Updated 3 weeks ago
- A community collection of security reviews of open source software components.☆96Updated last year