A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.
☆111Nov 26, 2024Updated last year
Alternatives and similar repositories for awesome-sca
Users that are interested in awesome-sca are comparing it to the libraries listed below
Sorting:
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆205Dec 6, 2023Updated 2 years ago
- A comprehensive list of software composition analysis tools.☆163Feb 20, 2026Updated 2 weeks ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- A curated list of SBOM (Software Bill Of Materials) related tools, frameworks, blogs, podcasts, and articles☆571May 20, 2025Updated 9 months ago
- IPv6 network walking utilities (ip6dnswalk, ip6dnshide)☆22May 27, 2014Updated 11 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- A blog of Programming Languages Group @Purdue☆11Feb 17, 2026Updated 2 weeks ago
- Palestra sobre desenvolvimento seguro de imagens e containers para a DockerCon 2021 sala Brasil☆10May 27, 2021Updated 4 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,719Aug 2, 2024Updated last year
- Making CoreOS' Clair easily work in CI/CD pipelines☆29Sep 10, 2023Updated 2 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆30Jun 18, 2019Updated 6 years ago
- Modular framework for file information extraction and dependency analysis to generate accurate SBOMs☆39Mar 1, 2026Updated last week
- ☆12Feb 18, 2021Updated 5 years ago
- [Free Training Workshop] Security Controls for Kubernetes☆15Mar 15, 2021Updated 4 years ago
- A curated list of Falco related tools, frameworks, blogs, podcasts, and articles☆202Jul 28, 2021Updated 4 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- GitHub Action to get a license overview in SPDX format☆14Dec 24, 2021Updated 4 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 9 months ago
- A terraform module to create a VPC with secure default configurations.☆17Jan 18, 2022Updated 4 years ago
- Terraform Enterprise/Cloud Infrastructure Automation☆16Jun 30, 2023Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- ☆16Jun 21, 2024Updated last year
- A comprehensive tool for doing threat intelligence againts IP addresses to determine if it's are malicious☆32Dec 16, 2025Updated 2 months ago
- The Auditree common fetchers, checks and harvest reports library.☆21Nov 9, 2023Updated 2 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- Terraform Cloud Wrapper☆17Mar 6, 2023Updated 3 years ago
- The Solutions Delivery Platform runtime pipeline framework☆40Mar 1, 2019Updated 7 years ago
- 📚 A curated list of awesome Docker security resources☆709Feb 28, 2026Updated last week
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆1,035Jan 5, 2026Updated 2 months ago
- Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX☆19Jul 22, 2023Updated 2 years ago
- Pivot into private VPC networks using a VPN connection☆43Oct 8, 2019Updated 6 years ago
- Using AWS for GitHub Actions and various security features available through AWS Container Services like Amazon ECS, AWS Fargate, and Ama…☆16Mar 15, 2021Updated 4 years ago
- A deliberately vulnerable js app made with reactjs. For educational purposes.☆17Mar 20, 2019Updated 6 years ago
- An OPA library to develop IT Control policies, for the IBM Cloud☆17Sep 26, 2022Updated 3 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 2 years ago
- A curated list for Awesome Kubernetes Security resources☆1,993Mar 1, 2026Updated last week