magnologan / awesome-sca
A comprehensive list of software composition analysis tools.
☆141Updated 10 months ago
Alternatives and similar repositories for awesome-sca:
Users that are interested in awesome-sca are comparing it to the libraries listed below
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆114Updated last week
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆103Updated 4 months ago
- Sharing software supply chain security open source projects☆48Updated 2 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆132Updated last year
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆142Updated last year
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆303Updated this week
- Awesome resources about Security in Kubernetes☆42Updated 2 years ago
- Software Component Verification Standard (SCVS)☆143Updated 2 weeks ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆200Updated this week
- ☆61Updated 2 months ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆561Updated 3 weeks ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆151Updated this week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 10 months ago
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 9 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Dependency Combobulator☆93Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆62Updated 9 months ago
- ☆189Updated 5 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆92Updated 2 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 5 months ago
- ☆95Updated 2 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated last month
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 2 years ago
- Curating Falco rules with MITRE ATT&CK Matrix☆78Updated last year
- A full insecure kubernetes application for testing security tools☆70Updated 2 weeks ago
- OWASP Foundation Threat Dragon Project Web Repository☆79Updated last week
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 4 months ago
- Fully open-source SAST scanner supporting a range of languages and frameworks. Integrates with major CI pipelines and IDE such as Azure D…☆148Updated 4 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated 3 weeks ago