veracode / veracode-pipeline-mitigationLinks
Retrieves findings with APPROVED mitigations from an application's policy scan (or sandbox) and creates a baseline file for Pipeline Scan. Mitigations in a "proposed" state will not be retrieved.
☆10Updated last year
Alternatives and similar repositories for veracode-pipeline-mitigation
Users that are interested in veracode-pipeline-mitigation are comparing it to the libraries listed below
Sorting:
- completely ridiculous API (crAPI)☆1,387Updated last week
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,146Updated last year
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,316Updated 11 months ago
- Snyk filtering for SNYK CLI☆17Updated last month
- Vulnerable app with examples showing how to not use secrets☆1,377Updated last week
- Burp Suite Certified Practitioner Exam Study☆1,257Updated last month
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆994Updated 2 months ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆907Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,949Updated 7 months ago
- Python helper library for working with the Veracode APIs. Handles retries, pagination, and other features of the modern Veracode REST API…☆25Updated 3 weeks ago
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆870Updated last month
- The Secure Coding Dojo is a platform for delivering secure coding knowledge.☆597Updated 3 weeks ago
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,168Updated last year
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆904Updated last year
- Twitter vulnerable snippets☆1,081Updated 9 months ago
- OWASP Foundation Web Respository☆22Updated 2 months ago
- Automating situational awareness for cloud penetration tests.☆2,257Updated this week
- A Broken Application - Very Vulnerable!☆178Updated last week
- An open source threat modeling tool from OWASP☆1,263Updated this week
- Awesome Vulnerable Applications☆1,297Updated 2 weeks ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,679Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!☆701Updated 2 weeks ago
- This is a companion to the Security Engineer Questions☆205Updated 2 years ago
- Create your own vulnerable by design AWS penetration testing playground☆409Updated 3 months ago
- A OWASP Based Checklist With 500+ Test Cases☆829Updated 3 years ago
- Non-official write up for the Juice-Shop CTF☆52Updated 7 months ago
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆536Updated last week
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆563Updated last month
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,171Updated last year
- This repo contains the code for my secure code review challenges. People used this as the primary resource to pass FAANG AppSec interview…☆269Updated 2 weeks ago