Here are
45 public repositories
matching this topic...
Dependency-Track is an intelligent Supply Chain Component Analysis platform that allows organizations to identify and reduce risk from the use of third-party and open source components.
Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain
Integrates Dependency-Check reports into SonarQube
Updated
Aug 9, 2017
Objective-C
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Updated
Jul 3, 2020
Scala
A simple Java command-line utility to mirror the CVE JSON data from NIST.
Jenkins plugin for OWASP Dependency-Check. Inspects project components for known vulnerabilities (e.g. CVEs).
Updated
Jul 16, 2020
Java
A Java library for parsing and programmatically using threat models
Updated
Aug 11, 2020
Java
Integrates OWASP Zed Attack Proxy reports into SonarQube
Updated
Jul 19, 2020
Java
Software Bill-of-Material (SBOM) specification designed for use in application security contexts and supply chain component analysis
Vendor-Neutral Security Tool Automation Controller (over REST)
Updated
Jun 28, 2019
Java
A simple Java command-line utility to mirror the entire contents of VulnDB.
Updated
Aug 24, 2020
Java
Repository of events for the Software Crafters Sydney community
Updated
Aug 1, 2019
JavaScript
Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)
Attacking the Nintendo 3DS Boot ROMs
SIde-Channel Analysis toolKit: embedded security evaluation tools
A toolchain for software integrity protection including self-checksumming, control flow integrity, result checking, oblivious hashing and a sample program protected using Intel SGX
CS 642 (Spring 2020): Introduction to Information Security @ UW-Madison
My lab reports for some of the security labs developed by Prof. Du of SU.
Behavior based program partitioning for security enclaves
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
Experiments with automatic software piracy detection utilising machine-learning classifiers for micro-signatures
Updated
Aug 29, 2019
Python
This repository contains the exploits to Linux VM binaries provided by Exploits1 course by opensecuritytraining
Updated
May 7, 2019
Python
A course module on Software Security
Educational project containing different knowledge about software security
Repo for my golang practice that is wanted to be shared publicly via. every computer I ever access.
Improve this page
Add a description, image, and links to the
software-security
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
software-security
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.