fortify / FortifyVulnerabilityExporterLinks
Deprecated; please use fcli instead
☆27Updated 5 months ago
Alternatives and similar repositories for FortifyVulnerabilityExporter
Users that are interested in FortifyVulnerabilityExporter are comparing it to the libraries listed below
Sorting:
- Sharing software supply chain security open source projects☆53Updated 3 years ago
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆97Updated this week
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆111Updated last year
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project…☆110Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated 3 weeks ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- OWASP Foundation Web Respository☆56Updated 4 months ago
- OWASP Kubernetes security and compliance tool [WIP]☆108Updated 2 years ago
- Golang installer for DefectDojo☆29Updated last year
- Integrates OWASP Zed Attack Proxy reports into SonarQube☆73Updated 6 months ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 3 years ago
- a tool to audit the istio service mesh☆174Updated 4 years ago
- Offensive Terraform Website☆45Updated 5 years ago
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆43Updated 4 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- Publishes BOMs to Dependency-Track from GitHub Actions☆58Updated last year
- CLI component of OWASP PurpleTeam☆134Updated 2 years ago
- A utility to (re-)import findings and language data into DefectDojo☆43Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆69Updated 5 years ago
- A Java library for calculating CVSSv2, CVSSv3, and CVSSv4 scores and vectors☆51Updated 2 weeks ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆177Updated last year
- OWASP Foundation Web Respository☆101Updated last month
- Generates an html report from SonarQube☆103Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆42Updated 3 years ago
- A comprehensive list of software composition analysis tools.☆162Updated 3 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 7 months ago
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆337Updated last month
- For use in our Tenable.IO to AWS Security Hub integration☆28Updated 5 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- ☆122Updated 9 months ago