jeremylong / malicious-dependenciesLinks
Demonstrates how a malicious dependency could negatively impact the build output.
☆24Updated last year
Alternatives and similar repositories for malicious-dependencies
Users that are interested in malicious-dependencies are comparing it to the libraries listed below
Sorting:
- boostsecurityio/lotp☆128Updated 3 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆122Updated 4 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 7 months ago
- ☆111Updated 2 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 10 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 3 months ago
- AI featured threat modeling and security review action☆44Updated 7 months ago
- LLM Testing Findings Templates☆72Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆136Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 5 months ago
- ☆35Updated 4 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 2 weeks ago
- Manager of third-party sources of Semgrep rules 🗂☆87Updated 11 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆107Updated last year
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated 11 months ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated last month
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated 10 months ago
- InfoSec OpenAI Examples☆19Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆40Updated last month
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆24Updated 9 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- ☆19Updated 3 years ago
- Nuclei plugins to audit Chrome extensions☆65Updated 11 months ago
- AI featured threat modeling and security review project☆16Updated 7 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- ☆14Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year