awesome-security / awesome-static-analysisLinks
A curated list of static analysis tools, linters and code quality checkers for various programming languages
☆47Updated 9 years ago
Alternatives and similar repositories for awesome-static-analysis
Users that are interested in awesome-static-analysis are comparing it to the libraries listed below
Sorting:
- ☆156Updated 5 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆111Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆301Updated this week
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆84Updated last week
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆59Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆113Updated 6 months ago
- Fork Threat Modeling Platform - Community☆27Updated 4 months ago
- Secure Software Development Fundamentals courses (from the OpenSSF Best Practices WG)☆200Updated last month
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆344Updated 2 years ago
- A comprehensive list of software composition analysis tools.☆163Updated 3 months ago
- Code Hierarchy Exploration Net (chen)☆24Updated 2 weeks ago
- A curated list of Awesome Security Challenges.☆211Updated last year
- Payloads for Attacking Large Language Models☆119Updated 3 weeks ago
- A very simple open source implementation of Google's Project Naptime☆184Updated 10 months ago
- Monthly CVE Stats☆44Updated last week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 7 months ago
- OWASP Ontology-driven Threat Modelling framework☆40Updated 2 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆135Updated 2 years ago
- Core model including reused documentation☆101Updated last month
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated this week
- LLM Testing Findings Templates☆75Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆128Updated last week
- DevSecOpsGuides☆192Updated 10 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆483Updated 8 months ago
- ☆44Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year
- Collection of writeups on ICS/SCADA security.☆194Updated 3 months ago
- Browser based Privacy Aware SBoM Exploration☆27Updated last month
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆141Updated 2 years ago