Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for software security
software-security
x
43 search results found
Cve
⭐
5,806
Gather and update all available and newest CVEs with their PoC.
Dependency Track
⭐
2,119
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Inventory
⭐
1,019
Asset inventory of over 800 public bug bounty programs.
Dependency Check Sonar Plugin
⭐
532
Integrates Dependency-Check reports into SonarQube
Puma Scan
⭐
413
Puma Scan is a software security Visual Studio extension that provides real time, continuous source code analysis as development teams write code. Vulnerabilities are immediately displayed in the development environment as spell check and compiler warnings, preventing security bugs from entering your applications.
Keyshuffling
⭐
340
Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain
Specification
⭐
300
CycloneDX is a full-stack Bill of Materials (BOM) standard that provides advanced supply chain capabilities for cyber risk reduction. SBOM, SaaSBOM, HBOM, ML-BOM, OBOM, MBOM, VDR, and VEX
Macbook
⭐
265
《macOS软件安全与逆向分析》随书源码
Sbt Dependency Check
⭐
259
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Cvemon
⭐
228
Monitoring exploits & references for CVEs
Nist Data Mirror
⭐
195
A simple Java command-line utility to mirror the CVE JSON data from NIST.
Vulnerator
⭐
163
The official distribution of the vulnerability parsing utility.
Dependency Check Plugin
⭐
124
Jenkins plugin for OWASP Dependency-Check. Inspects project components for known vulnerabilities (e.g. CVEs).
Find Gh Poc
⭐
117
Find CVE PoCs on GitHub
Software Supply Chain Security
⭐
102
A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling, books, articles and a plethora of learning resources from the web.
Log4j
⭐
74
Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
Security Belts
⭐
70
Threatmodel Sdk
⭐
68
A Java library for parsing and programmatically using threat models
Zap Sonar Plugin
⭐
66
Integrates OWASP Zed Attack Proxy reports into SonarQube
Threat Model Playbook
⭐
43
Vulndb Data Mirror
⭐
30
A simple Java command-line utility to mirror the entire contents of VulnDB.
K Hunt
⭐
29
K-Hunt: Pinpointing Insecure Crypto Keys
Vuddy
⭐
28
VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)
Hakbot Origin Controller
⭐
28
Vendor-Neutral Security Tool Automation Controller (over REST)
Application Security
⭐
26
Resources for learning about application security
Obfuscator Llvm
⭐
24
Obfuscator as LLVM extension
Graphspd
⭐
21
The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, May 22-26, 2023.
Teiniker Lectures Securecoding
⭐
18
Seedlab
⭐
17
Records & Reports for Seed-project
Cobfu
⭐
16
C/C++ Source Code Obfuscator
Events
⭐
14
Repository of events for the Software Crafters Sydney community
Data_obfuscation
⭐
14
Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)
Packages
⭐
13
Automated compromise detection of the world's most popular packages
Continuous Secsoft
⭐
13
Placeholder for course materials taught by Akond Rahman
Docker Ollvm
⭐
13
Easily build and package Obfuscator-LLVM into Android NDK.
Security
⭐
13
software vulnerabilities
Oss_fortress
⭐
12
Workshop for finding software vulnerabilities using open source tools, which includes a Goat-like Python and C application
Security Resources
⭐
12
Megagrep
⭐
10
Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directly but for places where you could manually find some.
Macbook_issues
⭐
10
《macOS软件安全与逆向分析》勘误
Bootroms
⭐
9
Attacking the Nintendo 3DS Boot ROMs
Ctf
⭐
8
ctf指南
Cracking The Coding Interview
⭐
5
A Collection of Potential Solutions to the Book - Cracking the Coding Interview 6th Edition
1-43 of 43 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.