checkmarx-ltd / cx-flowLinks
Checkmarx Scan and Result Orchestration
☆101Updated last week
Alternatives and similar repositories for cx-flow
Users that are interested in cx-flow are comparing it to the libraries listed below
Sorting:
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Updated 7 years ago
- Checkmarx Python SDK☆28Updated this week
- ☆418Updated 2 years ago
- Fully open-source SAST scanner supporting a range of languages and frameworks. Integrates with major CI pipelines and IDE such as Azure D…☆149Updated 5 years ago
- Container Security Verification Standard☆58Updated 6 years ago
- Exports vulnerability scan data from the Checkmarx SAST platform for use in analytical tools.☆19Updated 10 months ago
- Software Component Verification Standard (SCVS)☆149Updated 5 months ago
- Zap baseline scanner in Docker with authentication☆103Updated last year
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆852Updated 2 years ago
- threatspec - continuous threat modeling, through code☆366Updated 4 years ago
- Useful tools and Examples made by Checkmarx Professional Services☆39Updated 2 weeks ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆282Updated this week
- ☆124Updated last year
- OWASP Cloud Security - Enabling conversations through threat and control stories☆181Updated 6 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆109Updated last year
- OWASP Foundation Threat Dragon Project Web Repository☆82Updated 2 weeks ago
- ☆537Updated last week
- Sample scan files for testing DefectDojo imports☆81Updated 3 weeks ago
- Python API library for DefectDojo☆42Updated 2 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆185Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆72Updated last year
- OWASP Serverless Top 10☆218Updated 4 years ago
- This project is about creating and publishing threat model examples.☆424Updated 3 years ago
- A Continuous Threat Modeling methodology☆325Updated 3 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆327Updated last year
- SAMM stands for Software Assurance Maturity Model.☆395Updated 3 years ago
- NextJS-based single-page application for completing and reviewing SAMM assessments☆76Updated 2 years ago
- Agile Threat Modeling Toolkit☆693Updated 2 weeks ago
- Repo to hold mapping of user-security-stories☆119Updated 6 years ago
- oauth security guidelines☆227Updated 6 years ago