thomsonreuters / secrets-finderLinks
☆8Updated last year
Alternatives and similar repositories for secrets-finder
Users that are interested in secrets-finder are comparing it to the libraries listed below
Sorting:
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 7 months ago
- ☆112Updated last week
- A tool to check the security settings of Github Organizations.☆71Updated 2 years ago
- ☆123Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 10 months ago
- The security workflow engine!☆116Updated this week
- Container Security Verification Standard☆58Updated 5 years ago
- A utility to (re-)import findings and language data into DefectDojo☆43Updated 9 months ago
- Generate a score for your sbom to understand if it will actually be useful.☆230Updated 10 months ago
- ☆65Updated 2 years ago
- Security scanning & static analysis tool☆94Updated 8 months ago
- NextJS-based single-page application for completing and reviewing SAMM assessments☆74Updated 2 years ago
- AI featured threat modeling and security review action☆44Updated 7 months ago
- Software Component Verification Standard (SCVS)☆147Updated 2 months ago
- Count distinct contributor of Snyk watched repos across several SCM☆32Updated last year
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Updated 6 years ago
- Documenting your Threat Models with HCL☆431Updated 3 weeks ago
- The OWASP best practices and guidelines for Secrets Management☆8Updated 6 years ago
- Pin designs for security related items☆37Updated last year
- OWASP Kubernetes Security Testing Guide☆38Updated 9 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆205Updated this week
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆40Updated last month
- A Continuous Threat Modeling methodology☆321Updated 3 years ago
- Systematic Universal Security Testing Orchestration☆37Updated 3 years ago
- Protect against subdomain takeover☆92Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆101Updated last year
- App that simplifies building decision trees to model adverse scenarios☆213Updated 11 months ago
- ☆110Updated 11 months ago
- OWASP Foundation Web Respository☆55Updated 2 years ago