fortify / FortifyVulnerabilityExporterLinks
Export Fortify vulnerability data to GitHub, GitLab, SonarQube and more
☆26Updated last year
Alternatives and similar repositories for FortifyVulnerabilityExporter
Users that are interested in FortifyVulnerabilityExporter are comparing it to the libraries listed below
Sorting:
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆41Updated last year
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆107Updated 7 months ago
- Integrates OWASP Zed Attack Proxy reports into SonarQube☆70Updated last year
- Publishes BOMs to Dependency-Track from GitHub Actions☆54Updated 9 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 3 weeks ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 3 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project…☆110Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- OWASP Foundation Web Respository☆97Updated 5 months ago
- OWASP Foundation Web Respository☆10Updated 2 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated last month
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated 2 years ago
- For use in our Tenable.IO to AWS Security Hub integration☆28Updated last month
- A Java library for calculating CVSSv2 and CVSSv3 scores and vectors☆46Updated 7 months ago
- ☆117Updated 3 months ago
- Offensive Terraform Website☆45Updated 4 years ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- ☆20Updated 6 years ago
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆78Updated last week
- A cli that can be used to query various online vulnerability sources such as the NVD or GHSA. The CLI and docker images can be used to mi…☆148Updated this week
- javaspringvulny - a Spring Boot web application built wrong on purpose☆21Updated 2 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆71Updated 2 years ago
- Kubernetes Stranger Danger☆62Updated this week
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆189Updated 10 months ago
- Sharing software supply chain security open source projects☆50Updated 2 years ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆58Updated 3 years ago
- Zap baseline scanner in Docker with authentication☆103Updated last year
- A comprehensive list of software composition analysis tools.☆152Updated last year