awesome-security / awesome-static-analysisLinks
A curated list of static analysis tools, linters and code quality checkers for various programming languages
☆38Updated 8 years ago
Alternatives and similar repositories for awesome-static-analysis
Users that are interested in awesome-static-analysis are comparing it to the libraries listed below
Sorting:
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆66Updated this week
- A static analyzer powered by AI☆21Updated 10 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 2 months ago
- Trail of Bits Testing Handbook☆75Updated this week
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆105Updated 6 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆47Updated 7 months ago
- ☆25Updated last year
- ☆247Updated 4 months ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 weeks ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 3 months ago
- ☆134Updated 3 weeks ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆112Updated 8 months ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆125Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- An awesome list of resources on deception-based security with honeypots and honeytokens☆173Updated 5 months ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆115Updated 3 weeks ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated last week
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆100Updated 8 months ago
- Open Threat Hunting Framework☆117Updated 2 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆278Updated last year
- A curated list of Awesome Security Challenges.☆186Updated 7 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆183Updated 9 months ago
- Monthly CVE Stats☆42Updated last month
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆300Updated this week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 11 months ago