fortify / FortifyVulnerabilityExporterLinks
Deprecated; please use fcli instead
☆27Updated 4 months ago
Alternatives and similar repositories for FortifyVulnerabilityExporter
Users that are interested in FortifyVulnerabilityExporter are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆100Updated this week
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆109Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated 2 weeks ago
- Offensive Terraform Website☆45Updated 5 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project…☆110Updated last year
- Integrates OWASP Zed Attack Proxy reports into SonarQube☆73Updated 5 months ago
- An Awesome List of Log4Shell resources to help you stay informed and secure! 🔒☆234Updated 3 years ago
- a tool to audit the istio service mesh☆173Updated 4 years ago
- A Java library for calculating CVSSv2, CVSSv3, and CVSSv4 scores and vectors☆50Updated 2 weeks ago
- OWASP Foundation Web Respository☆57Updated 2 months ago
- Generates an html report from SonarQube☆103Updated last year
- Grype vulnerability check plugin for Visual Studio Code☆24Updated last year
- Take this course to learn how to create fine-grained, least-privilege HashiCorp Vault roles for GitHub Action workflows using GitHub OIDC…☆15Updated last month
- A BOM repository server for distributing CycloneDX BOMs☆86Updated 5 months ago
- OWASP Kubernetes security and compliance tool [WIP]☆108Updated 2 years ago
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆43Updated 2 months ago
- CLI component of OWASP PurpleTeam☆133Updated 2 years ago
- Publishes BOMs to Dependency-Track from GitHub Actions☆57Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆69Updated 5 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- ☆103Updated last month
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆78Updated this week
- A comprehensive list of software composition analysis tools.☆159Updated 2 months ago
- A very vulnerable implementation of a GraphQL API.☆17Updated 2 weeks ago
- Awesome resources about Security in Kubernetes☆46Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 5 months ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 3 years ago
- Sharing software supply chain security open source projects☆53Updated 3 years ago
- A utility to (re-)import findings and language data into DefectDojo☆43Updated last year
- ☆119Updated 8 months ago