magnologan / awesome-sca
A comprehensive list of software composition analysis tools.
☆136Updated 8 months ago
Alternatives and similar repositories for awesome-sca:
Users that are interested in awesome-sca are comparing it to the libraries listed below
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆105Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated last year
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆99Updated 2 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated last week
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated 3 weeks ago
- Sharing software supply chain security open source projects☆45Updated 2 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆62Updated 8 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆141Updated 11 months ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆289Updated this week
- ☆180Updated 3 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆38Updated 2 months ago
- OWASP Foundation Web Respository☆81Updated last month
- Manager of third-party sources of Semgrep rules 🗂☆78Updated 6 months ago
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆62Updated 3 weeks ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆542Updated last week
- VMC: a Scalable, Open Source and Free Vulnerability Management Platform☆86Updated 3 weeks ago
- Software Component Verification Standard (SCVS)☆140Updated 10 months ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆133Updated this week
- Analyze any snippet, file, or repository to detect possible security flaws such as secret in code, open source vulnerability, code securi…☆76Updated 6 months ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆58Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆178Updated this week
- Awesome resources about Security in Kubernetes☆41Updated 2 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆49Updated last week
- ☆404Updated 2 years ago
- Tool to guess CPE name based on common software name☆91Updated 2 months ago
- A full insecure kubernetes application for testing security tools☆66Updated this week
- Secrets scanner that understands code☆188Updated last year
- Kubernetes Pwnage for all☆56Updated 4 years ago