lirantal / cwe-sdk
A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC
☆10Updated 4 years ago
Alternatives and similar repositories for cwe-sdk:
Users that are interested in cwe-sdk are comparing it to the libraries listed below
- Externalize Java application access to protected resources as log messages.☆41Updated 10 months ago
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 2 years ago
- General Open Architecture Security Questionnaire☆31Updated last year
- ☆13Updated 11 months ago
- ☆20Updated 6 years ago
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆41Updated 9 months ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Security scanning & static analysis tool☆94Updated 5 months ago
- A zero-dependency tool for finding secrets in directories☆10Updated 4 years ago
- Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.☆23Updated 2 years ago
- Open Security Summit 2019☆25Updated 4 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Updated 5 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆56Updated 6 months ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- Dependency Combobulator☆93Updated last year
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- A static analysis API for finding deserialization attack gadgets☆38Updated 2 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated 3 weeks ago
- ☆10Updated this week
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- Burp Suite extension to passively scan for applications revealing server error messages☆66Updated last year
- Kubernetes Security Testing Guide☆26Updated 11 months ago
- Vulnerable Java based Web Application☆31Updated 5 years ago
- A tool for detecting regular expression denial-of-service vulnerabilities in Android apps.☆33Updated 8 years ago
- ☆74Updated 4 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Updated 6 years ago
- OWASP Foundation Web Respository☆14Updated last month