magnologan / awesome-scaLinks
A comprehensive list of software composition analysis tools.
☆156Updated last month
Alternatives and similar repositories for awesome-sca
Users that are interested in awesome-sca are comparing it to the libraries listed below
Sorting:
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆131Updated 3 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆107Updated 11 months ago
- Sharing software supply chain security open source projects☆53Updated 2 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆138Updated last year
- Global Security Database☆315Updated last year
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆155Updated last year
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆41Updated 11 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 9 months ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆183Updated this week
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆590Updated 7 months ago
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆335Updated 2 years ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆401Updated last week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆254Updated last week
- A project to visualize the software supply chain☆54Updated 2 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆190Updated last year
- Software Component Verification Standard (SCVS)☆150Updated 7 months ago
- ☆100Updated 9 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 4 months ago
- ☆103Updated last week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆74Updated last month
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆208Updated last month
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated last year
- Analyze any snippet, file, or repository to detect possible security flaws such as secret in code, open source vulnerability, code securi…☆79Updated last year
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆60Updated 3 years ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆74Updated this week
- ☆419Updated 2 years ago
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆854Updated 2 years ago
- Secure Software Development Fundamentals courses (from the OpenSSF Best Practices WG)☆197Updated 3 months ago
- Manager of third-party sources of Semgrep rules 🗂☆90Updated last year