Shim to easily install OWASP dependency-check-cli into Python projects
☆50Apr 13, 2026Updated 3 weeks ago
Alternatives and similar repositories for dependency-check-py
Users that are interested in dependency-check-py are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Apr 27, 2018Updated 8 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 5 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Oct 26, 2020Updated 5 years ago
- ☆21Jul 26, 2021Updated 4 years ago
- API to interact with the python pyproject.toml based projects☆25Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆11Feb 28, 2024Updated 2 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆13Jul 16, 2024Updated last year
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆13Oct 16, 2025Updated 6 months ago
- A-Frame GLTF Exporter component☆13Apr 13, 2018Updated 8 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Automate the generation, setup, check, copy site, host and user docker TLS certificates; Setup and manage dockerd configuration for Ubun…☆19Apr 30, 2021Updated 5 years ago
- Check Safety of SSH Public Keys☆12Oct 8, 2022Updated 3 years ago
- CLI to manage GoCD installations using docker and pipeline-as-code☆13Jul 2, 2017Updated 8 years ago
- OpenControl content for Red Hat technologies☆16Jan 20, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Community rules for Commit Watcher☆24Jun 9, 2016Updated 9 years ago
- ☆14Dec 1, 2017Updated 8 years ago
- ☆11Jun 10, 2020Updated 5 years ago
- Mortality data for Mexico, along with useful extra data☆15Jan 14, 2011Updated 15 years ago
- Elf checksec in Go.☆14May 10, 2022Updated 3 years ago
- A catalog of error codes for flake8 Python static analysis tool & a few of its plugins.☆11Oct 6, 2021Updated 4 years ago
- Checking for leaked passwords through haveibeenpwned v2 API using the hash-range checker☆12Feb 7, 2024Updated 2 years ago
- Noduino Falcon Board☆12Sep 30, 2016Updated 9 years ago
- User defined static call-tree constraints in C++. This is the implementation of the tool for my masters thesis.☆14Sep 25, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆23Apr 26, 2018Updated 8 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- Run flake8 checks on code in *.rst files or in docstrings☆22Feb 26, 2021Updated 5 years ago
- Baseline, check and correct your SQL Database Security☆12Mar 9, 2022Updated 4 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- ☆13Dec 6, 2017Updated 8 years ago
- Http Security Headers Checker Tool written in PHP Cli + Useful Tips to set Http Security Headers☆10Mar 27, 2021Updated 5 years ago
- A list of important security checks for GitHub individual and organization accounts☆16Jan 1, 2018Updated 8 years ago
- Bootstrapping Kubernetes Cluster☆21Mar 13, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- A blog for communicating data-driven stories around the issue of homelessness in the Los Angeles area.☆10Sep 13, 2016Updated 9 years ago
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 10 years ago
- Django password validator that checks for passwords in known data breaches.☆15Feb 6, 2019Updated 7 years ago
- ARCHIVED - Tool to perform security check on dependencies embedded in given Go binary☆11Nov 26, 2024Updated last year
- ☆16May 12, 2018Updated 7 years ago
- Android application for checking security level of DRM and HDCP☆12Jan 23, 2023Updated 3 years ago