ZupIT / horusecLinks
Horusec is an open source tool that improves identification of vulnerabilities in your project with just one command.
☆1,280Updated last week
Alternatives and similar repositories for horusec
Users that are interested in horusec are comparing it to the libraries listed below
Sorting:
- Performing security tests inside your CI☆585Updated last year
- Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilit…☆551Updated 3 years ago
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆854Updated 2 years ago
- A laboratory for learning secure web and mobile development in a practical manner.☆963Updated last year
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,044Updated last year
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆1,021Updated this week
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastruct…☆2,514Updated last week
- Checklist for container security - devsecops practices☆1,604Updated 2 months ago
- njsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.☆417Updated last year
- RegVuln is a tool that use Engine Trivy to generate reports about images Docker from Registry, have integration with Defect Dojo to Vulne…☆16Updated last year
- An open-source project in Golang to asess different API Security tools and WAF for detection logic and bypasses☆1,734Updated 3 months ago
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆983Updated last month
- ☆421Updated 2 years ago
- Security Champions Playbook v 2.1☆384Updated 2 years ago
- OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for …☆1,183Updated last week
- secureCodeBox (SCB) - continuous secure delivery out of the box☆923Updated this week
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆487Updated 2 years ago
- A curated list for Awesome Kubernetes Security resources☆1,985Updated 2 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,307Updated 10 months ago
- Conviso Vulnerable Web Application is the OSS project from the Conviso Application Security for the community. The project represents a v…☆62Updated 4 months ago
- ☆547Updated last week
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆590Updated 7 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,166Updated last year
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆717Updated 2 years ago
- Getting a handle on container security☆673Updated last year
- An open source threat modeling tool from OWASP☆1,247Updated this week
- Automating situational awareness for cloud penetration tests.☆2,241Updated 2 weeks ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆764Updated 11 months ago
- ☆36Updated last year
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,208Updated 9 months ago