cytix-software / AppSec-Detection-FrameworkLinks
A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilities
☆32Updated last month
Alternatives and similar repositories for AppSec-Detection-Framework
Users that are interested in AppSec-Detection-Framework are comparing it to the libraries listed below
Sorting:
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Updated last year
- Protect against subdomain takeover☆95Updated 5 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- boostsecurityio/lotp☆137Updated 2 months ago
- ☆114Updated 2 years ago
- A project to visualize the software supply chain☆57Updated 2 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆75Updated last year
- ☆193Updated 8 months ago
- ☆62Updated 7 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated 2 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 7 months ago
- find dangling domains in a multi cloud environment☆174Updated 3 weeks ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆48Updated 2 years ago
- OWASP Foundation Web Respository☆100Updated 3 weeks ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆45Updated last month
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆155Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆99Updated 3 months ago
- software asset scanning orchestration system☆33Updated last week
- A full insecure kubernetes application for testing security tools☆89Updated 2 months ago
- An AWS metadata enumeration tool by Plerion☆101Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 10 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 11 months ago
- AI featured threat modeling and security review action☆45Updated last year