jeremylong / malicious-dependenciesLinks
Demonstrates how a malicious dependency could negatively impact the build output.
☆24Updated 2 years ago
Alternatives and similar repositories for malicious-dependencies
Users that are interested in malicious-dependencies are comparing it to the libraries listed below
Sorting:
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆137Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 5 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆41Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated 2 years ago
- Data about all known supply-chain attacks through history☆62Updated 6 months ago
- boostsecurityio/lotp☆141Updated last month
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆131Updated 9 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Updated 2 weeks ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆75Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆34Updated 7 months ago
- ☆114Updated 2 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆140Updated last month
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- AI featured threat modeling and security review action☆45Updated last year
- ☆20Updated 3 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆178Updated this week
- A community collection of security reviews of open source software components.☆96Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 10 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- A project to visualize the software supply chain☆55Updated 2 years ago
- ☆131Updated last month
- AI featured threat modeling and security review project☆16Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Updated this week
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆156Updated last year
- InfoSec OpenAI Examples☆19Updated 2 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆121Updated 2 years ago
- The security workflow engine!☆135Updated 3 weeks ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated 6 months ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated last year
- LLM Testing Findings Templates☆75Updated last year