sonatype-nexus-community / chelsea
Dependency vulnerability auditor for Ruby
☆13Updated 5 months ago
Alternatives and similar repositories for chelsea:
Users that are interested in chelsea are comparing it to the libraries listed below
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 5 months ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 11 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last year
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- ☆10Updated 2 years ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- ZAP Management Scripts☆23Updated 3 weeks ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 2 months ago
- DefectDojo Community Content☆18Updated 6 months ago
- ☆16Updated 8 months ago
- ☆12Updated 5 months ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- ZAP scripts to implement ASVS L1 checking☆15Updated 2 years ago
- ☆18Updated last year
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Updated 8 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Save scan results to a database☆12Updated 2 weeks ago
- ☆29Updated 5 months ago
- Kubernetes Security Testing Guide☆26Updated last year
- ☆11Updated 8 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆14Updated 7 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 4 years ago