dowjones / reapsawView external linksLinks
Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple programming languages.
☆41Sep 23, 2020Updated 5 years ago
Alternatives and similar repositories for reapsaw
Users that are interested in reapsaw are comparing it to the libraries listed below
Sorting:
- ☆13Aug 13, 2019Updated 6 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆447Jul 17, 2023Updated 2 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- ☆30Dec 3, 2025Updated 2 months ago
- Generate CodeQL taint-tracking models for Go (along with tests) in a graphical UI☆20May 5, 2023Updated 2 years ago
- Collection of Azure Resource Manager (ARM) templates and resources to get started with developing custom resource providers☆22Nov 28, 2022Updated 3 years ago
- Framework for API Maturity Assessment☆20Jan 17, 2020Updated 6 years ago
- The challenge toolbox is a small component which allows you to create, run and check new challenges locally.☆27Mar 11, 2024Updated last year
- Start enforcing G Suite third-party apps via OAuth☆58Nov 3, 2025Updated 3 months ago
- ☆11Nov 22, 2024Updated last year
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Dec 15, 2019Updated 6 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- Github Audit Tool for Organizations☆37Jan 1, 2026Updated last month
- Rethinking the User Interface of AI☆28Updated this week
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆137May 9, 2024Updated last year
- ☆13Nov 5, 2024Updated last year
- Externalize Java application access to protected resources as log messages.☆43Jan 22, 2026Updated 3 weeks ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Sep 3, 2020Updated 5 years ago
- Monitoring CloudStack with Zenoss☆22Sep 28, 2017Updated 8 years ago
- A blog app written in Flask☆15Jan 3, 2015Updated 11 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Jun 26, 2020Updated 5 years ago
- A terraform module to deploy Vault as per the reference architecture☆14Mar 19, 2019Updated 6 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Depstubber generates type-correct stubs for Go dependencies, for use in testing☆17Mar 21, 2025Updated 10 months ago
- ☆16May 13, 2021Updated 4 years ago
- An applescript to use ghostty as terminal in alfred.☆12Nov 21, 2025Updated 2 months ago
- contains C programs that tests the effectiveness of SAST.☆12Jan 9, 2024Updated 2 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- A simple web app that helps developers understand the ASVS requirements. Now supporting ASVS 5.0☆163Nov 25, 2025Updated 2 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆45Updated this week
- GitHub Secret Scanning Auto Remediator (GSSAR)☆46Jan 1, 2026Updated last month
- Automated deployment of Apache Storm on Google Compute Engine (GCE)☆13May 24, 2014Updated 11 years ago
- ☆14Jan 10, 2025Updated last year
- Modify ELF executables☆16Mar 5, 2019Updated 6 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago