magnologan / awesome-sca
A comprehensive list of software composition analysis tools.
☆127Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-sca
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆126Updated 9 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆98Updated 5 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.0, purl, and vers…☆98Updated this week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆86Updated 9 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆61Updated 5 months ago
- Sharing software supply chain security open source projects☆39Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆98Updated 9 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆141Updated 8 months ago
- Awesome resources about Security in Kubernetes☆40Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆16Updated 3 years ago
- Curating Falco rules with MITRE ATT&CK Matrix☆74Updated 8 months ago
- Software Component Verification Standard (SCVS)☆135Updated 7 months ago
- WAF bypass PoC☆43Updated last year
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆515Updated this week
- A full insecure kubernetes application for testing security tools☆54Updated this week
- ☆175Updated 2 weeks ago
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆52Updated this week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆169Updated 9 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆33Updated last month
- ☆168Updated last month
- A project to visualize the software supply chain☆36Updated last year
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆288Updated last year
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆113Updated this week
- Dependency Combobulator☆88Updated 10 months ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆254Updated this week
- Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git☆80Updated this week
- Purposely vulnerable Java application to help lead secure coding workshops☆169Updated 4 months ago
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆64Updated 4 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆53Updated 2 months ago