dynatrace-oss / invadiumLinks
Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.
☆11Updated 2 years ago
Alternatives and similar repositories for invadium
Users that are interested in invadium are comparing it to the libraries listed below
Sorting:
- Unguard is an insecure cloud-native microservices demo application.☆52Updated last week
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆324Updated 2 years ago
- ☆13Updated last year
- Home page of project "KB"☆126Updated 3 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆135Updated last year
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated 2 months ago
- A reading list for software supply-chain security.☆363Updated 2 years ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆315Updated this week
- ☆237Updated last week
- SBOM Assess - Evaluate SBOM quality and compliance☆216Updated this week
- Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD …☆158Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆77Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆212Updated this week
- This repository contains a SonarQube Plugin that detects cryptographic assets in source code and generates CBOM.☆35Updated this week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 7 months ago
- OpenVEX Specification☆152Updated 3 weeks ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆63Updated last week
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆364Updated 6 months ago
- ☆16Updated 2 years ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆82Updated last week
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated 2 weeks ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆285Updated 9 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆383Updated last year
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆487Updated this week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 4 months ago
- KBOM - Kubernetes Bill of Materials☆317Updated 3 months ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 2 years ago
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆210Updated last month
- ☆12Updated 2 years ago
- Fork of the Dependency-Track API server. It includes various changes necessary to work with Hyades.☆15Updated this week