fortify / FortifyVulnerabilityExporterLinks
Deprecated; please use fcli instead
☆26Updated 3 weeks ago
Alternatives and similar repositories for FortifyVulnerabilityExporter
Users that are interested in FortifyVulnerabilityExporter are comparing it to the libraries listed below
Sorting:
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆107Updated 9 months ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project…☆110Updated last year
- Sharing software supply chain security open source projects☆52Updated 2 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆12Updated 3 years ago
- Integrates OWASP Zed Attack Proxy reports into SonarQube☆72Updated last month
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆66Updated 2 months ago
- Offensive Terraform Website☆45Updated 4 years ago
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated 2 years ago
- A comprehensive list of software composition analysis tools.☆154Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated last week
- ☆180Updated 4 months ago
- A very vulnerable implementation of a GraphQL API.☆16Updated this week
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆69Updated 4 years ago
- ☆118Updated 4 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆71Updated last year
- Awesome resources about Security in Kubernetes☆44Updated 2 years ago
- OWASP Foundation Web Respository☆98Updated 7 months ago
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆43Updated last year
- A Java library for calculating CVSSv2 and CVSSv3 scores and vectors☆47Updated 8 months ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆284Updated 2 years ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 7 months ago
- ☆102Updated 7 months ago
- ☆83Updated 7 months ago
- Generates an html report from SonarQube☆98Updated 11 months ago
- ☆28Updated 2 weeks ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆59Updated 3 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆72Updated 2 years ago
- Publishes BOMs to Dependency-Track from GitHub Actions☆55Updated 10 months ago