A community collection of security reviews of open source software components.
☆99Feb 29, 2024Updated 2 years ago
Alternatives and similar repositories for security-reviews
Users that are interested in security-reviews are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Mar 13, 2024Updated 2 years ago
- The purpose of the Metrics & Metadata (formerly Identifying Security Threats) working group is to enable stakeholders to have informed co…☆223Apr 23, 2024Updated 2 years ago
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆220Feb 4, 2026Updated 3 months ago
- Our objective is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance of the …☆206Jan 15, 2026Updated 4 months ago
- A guide on coordinated vulnerability disclosure for open source projects. Includes templates for security policies (security.md) and disc…☆137Apr 20, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The Best Practices for OSS Developers working group is dedicated to raising awareness and education of secure code best practices for ope…☆1,020May 12, 2026Updated last week
- Machine-readable specification for the attestation of security-relevant data.☆75May 11, 2026Updated last week
- Collating an overview of the open source software supply chain landscape -- and synthesizing that survey in a hopefully-useful way.☆33Apr 4, 2023Updated 3 years ago
- OpenSSF Security Tooling Working Group☆322Jul 6, 2025Updated 10 months ago
- SLSA level 3 action☆11Apr 26, 2024Updated 2 years ago
- Collection of tools for analyzing open source packages.☆361May 1, 2026Updated 3 weeks ago
- Our mission is to catalyze sustainable improvements to critical open source software projects and ecosystems.☆126May 12, 2026Updated last week
- Secure Software Development Fundamentals courses (from the OpenSSF Best Practices WG)☆202Apr 10, 2026Updated last month
- OASIS TC Open Repository: A GitHub repository for management of non-normative information about the work of the CSAF Technical Committee,…☆21Apr 27, 2026Updated 3 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A TUF repository and signing tool☆45Updated this week
- Supply Chain Integrity Model☆107Jun 12, 2023Updated 2 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- Open Source Vulnerability schema.☆248Updated this week
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆19Aug 18, 2023Updated 2 years ago
- OWASP Ontology-driven Threat Modelling framework☆42Jul 11, 2023Updated 2 years ago
- threatspec - continuous threat modeling, through code☆384Dec 30, 2020Updated 5 years ago
- Supply Chain Query Tool☆13May 25, 2022Updated 3 years ago
- ☆21Aug 7, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Repository of Vagrant images created by Continuum Analytics https://atlas.hashicorp.com/continuumio/☆11Aug 14, 2024Updated last year
- An introduction course to system exploitation based on pwnable.kr challenges☆23Feb 21, 2025Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ☆31May 11, 2026Updated last week
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆111Jan 29, 2025Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 5 months ago
- Externalize Java application access to protected resources as log messages.☆45May 15, 2026Updated last week
- Source files for the website☆17May 1, 2026Updated 3 weeks ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Knative common scripts.☆26Apr 28, 2026Updated 3 weeks ago
- Container Image Signing & Verifying on Ethereum [Testnet]☆17Mar 15, 2022Updated 4 years ago
- SBOM Move - Automate build and transfer of SBOMs across systems☆26May 4, 2026Updated 2 weeks ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 5 years ago
- ☆82Dec 10, 2025Updated 5 months ago
- ☆19Feb 11, 2026Updated 3 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago