veracode / veracode-pipeline-mitigationLinks
Retrieves findings with APPROVED mitigations from an application's policy scan (or sandbox) and creates a baseline file for Pipeline Scan. Mitigations in a "proposed" state will not be retrieved.
☆10Updated last year
Alternatives and similar repositories for veracode-pipeline-mitigation
Users that are interested in veracode-pipeline-mitigation are comparing it to the libraries listed below
Sorting:
- completely ridiculous API (crAPI)☆1,374Updated 2 weeks ago
- Python helper library for working with the Veracode APIs. Handles retries, pagination, and other features of the modern Veracode REST API…☆25Updated last week
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,047Updated last year
- Snyk filtering for SNYK CLI☆17Updated 2 weeks ago
- An open source threat modeling tool from OWASP☆1,247Updated this week
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆879Updated this week
- Vulnerable app with examples showing how to not use secrets☆1,371Updated last week
- The Seiso standard python cookiecutter template☆14Updated this week
- Take control of you SCM security posture enforcing policy as code☆13Updated last week
- Awesome secure by default libraries to help you eliminate bug classes!☆700Updated 7 months ago
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆983Updated last month
- A Pythonic framework for threat modeling☆1,069Updated last week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,938Updated 6 months ago
- Automating situational awareness for cloud penetration tests.☆2,252Updated 2 weeks ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆714Updated 2 months ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,309Updated 10 months ago
- ☆547Updated this week
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆559Updated 3 weeks ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,166Updated last year
- Non-official write up for the Juice-Shop CTF☆49Updated 6 months ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,276Updated 3 months ago
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆853Updated 2 months ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆735Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆111Updated last year
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆868Updated last week
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,669Updated last year
- Agile Threat Modeling Toolkit☆711Updated last week
- The Secure Coding Dojo is a platform for delivering secure coding knowledge.☆595Updated this week
- A Broken Application - Very Vulnerable!☆175Updated last week
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆636Updated last month