veracode / veracode-pipeline-mitigationLinks
Retrieves findings with APPROVED mitigations from an application's policy scan (or sandbox) and creates a baseline file for Pipeline Scan. Mitigations in a "proposed" state will not be retrieved.
☆11Updated last year
Alternatives and similar repositories for veracode-pipeline-mitigation
Users that are interested in veracode-pipeline-mitigation are comparing it to the libraries listed below
Sorting:
- Python helper library for working with the Veracode APIs. Handles retries, pagination, and other features of the modern Veracode REST API…☆25Updated 3 weeks ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- completely ridiculous API (crAPI)☆1,257Updated 2 weeks ago
- Snyk filtering for SNYK CLI☆16Updated 2 weeks ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆740Updated last week
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆990Updated 6 months ago
- materials we hand out☆145Updated 2 months ago
- Create your own vulnerable by design AWS penetration testing playground☆381Updated last month
- ☆527Updated this week
- A Continuous Threat Modeling methodology☆319Updated 2 years ago
- Security Champions Playbook v 2.1☆370Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!☆692Updated last month
- Segment's Threat Modeling training for our engineers☆243Updated 4 years ago
- The Secure Coding Dojo is a platform for delivering secure coding knowledge.☆581Updated 2 months ago
- ☆415Updated 2 years ago
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆935Updated 3 months ago
- Take control of you SCM security posture enforcing policy as code☆13Updated 4 months ago
- Websec interview questions by tib3rius answered☆309Updated last year
- A Broken Application - Very Vulnerable!☆162Updated this week
- ☆368Updated last year
- This project is about creating and publishing threat model examples.☆419Updated 3 years ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆392Updated 7 months ago
- OWASP Foundation Web Respository☆20Updated 2 months ago
- This is a companion to the Security Engineer Questions☆203Updated last year
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and p…☆1,618Updated 2 years ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆35Updated 3 months ago
- An open source threat modeling tool from OWASP☆1,112Updated this week
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆502Updated last month
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆693Updated 2 months ago
- Runs a scan using Dastardly by Burp Suite against a target site and creates a JUnit XML report for the scan on completion.☆290Updated 10 months ago