finos / CatchITLinks
Source code secret scanner
☆53Updated 2 years ago
Alternatives and similar repositories for CatchIT
Users that are interested in CatchIT are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆57Updated 2 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 5 months ago
- A community collection of security reviews of open source software components.☆96Updated last year
- Fork Threat Modeling Platform - Community☆27Updated 2 months ago
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- Scanner to identify dangling DNS records and subdomain takeovers☆50Updated last year
- Secure Software Development Fundamentals courses (from the OpenSSF Best Practices WG)☆197Updated this week
- A guide on coordinated vulnerability disclosure for open source projects. Includes templates for security policies (security.md) and disc…☆131Updated last month
- An open-source collection of API key rotation tutorials.☆76Updated 3 months ago
- The Secure Coding Framework☆22Updated 5 years ago
- ☆131Updated last week
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆204Updated 2 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆138Updated last year
- ☆10Updated 3 years ago
- Sharing software supply chain security open source projects☆53Updated 3 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- ☆21Updated 3 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated 2 weeks ago
- A comprehensive scanner for Google Cloud☆343Updated 2 weeks ago
- Software Component Verification Standard (SCVS)☆152Updated 8 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆133Updated last week
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Updated 4 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆54Updated 2 years ago
- AI based Secrets Detection Python Framework☆62Updated 6 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆74Updated 3 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆48Updated last year
- ☆102Updated 3 weeks ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 10 months ago