magnologan / awesome-scaLinks
A comprehensive list of software composition analysis tools.
☆147Updated last year
Alternatives and similar repositories for awesome-sca
Users that are interested in awesome-sca are comparing it to the libraries listed below
Sorting:
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆105Updated 6 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆135Updated last year
- Sharing software supply chain security open source projects☆50Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆120Updated this week
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆65Updated this week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆144Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 11 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 5 months ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆310Updated this week
- Awesome resources about Security in Kubernetes☆42Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 11 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆206Updated this week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆94Updated 3 months ago
- Software Component Verification Standard (SCVS)☆147Updated 2 months ago
- ☆194Updated 7 months ago
- A full insecure kubernetes application for testing security tools☆87Updated last month
- ☆68Updated 4 months ago
- Dependency Combobulator☆93Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆119Updated 3 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆181Updated 11 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last month
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆162Updated this week
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆292Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 6 months ago
- ☆76Updated 3 weeks ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆58Updated 3 years ago
- Global Security Database☆318Updated last year
- Secrets scanner that understands code☆190Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 4 months ago