jtmelton / camas
A zero-dependency tool for finding secrets in directories
☆10Updated 4 years ago
Alternatives and similar repositories for camas:
Users that are interested in camas are comparing it to the libraries listed below
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated 10 months ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- A Security Scanner for Go☆26Updated 6 years ago
- ☆63Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- ☆14Updated 11 months ago
- Python API library for DefectDojo☆41Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Updated 5 years ago
- My custom semgrep rules☆20Updated 4 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- ☆57Updated 4 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- ☆20Updated 6 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Serverless Workshop☆16Updated 2 years ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- ☆35Updated 3 years ago
- Security scanning & static analysis tool☆94Updated 5 months ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 8 months ago
- ☆14Updated 2 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- AWS Security Checks☆38Updated 7 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆62Updated 9 months ago