#
software-security
Here are 52 public repositories matching this topic...
Integrates Dependency-Check reports into SonarQube
security
sonarqube
owasp
visibility
vulnerabilities
appsec
component-analysis
nvd
sonar-plugin
software-security
vulnerable-components
-
Updated
Jul 2, 2021 - HTML
Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain
-
Updated
Dec 26, 2017 - TeX
《macOS软件安全与逆向分析》随书源码
reverse-engineering
malware-analysis
binary-analysis
macho
ios-security
software-security
macos-security
-
Updated
Aug 9, 2017 - Objective-C
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
security
devops
security-audit
scala
sbt
static-analysis
owasp
sbt-plugin
infosec
vulnerabilities
cve
appsec
nvd
software-security
owasp-dependencycheck
vulnerability-scanners
security-automation
devsecops
software-composition-analysis
-
Updated
Jun 24, 2021 - Scala
A simple Java command-line utility to mirror the CVE JSON data from NIST.
-
Updated
May 24, 2021 - Java
Jenkins plugin for OWASP Dependency-Check. Inspects project components for known vulnerabilities (e.g. CVEs).
security
devops
owasp
jenkins-plugin
visibility
vulnerabilities
appsec
component-analysis
nvd
software-security
owasp-dependencycheck
adopt-this-plugin
-
Updated
May 10, 2021 - Java
Software Bill of Material (SBOM) standard designed for use in application security contexts and supply chain component analysis
component
supply-chain
owasp
specification
standard
bom
software
license
spdx
cpe
software-security
swid
swid-tags
bill-of-materials
software-bill-of-materials
sbom
cyclonedx
-
Updated
May 6, 2021 - XSLT
A Java library for parsing and programmatically using threat models
-
Updated
May 24, 2021 - Java
Integrates OWASP Zed Attack Proxy reports into SonarQube
-
Updated
Jul 3, 2021 - HTML
Vendor-Neutral Security Tool Automation Controller (over REST)
security
devops
automation
rest
zap
dynamic-analysis
burp
appspider
nessus
appsec
software-security
threadfix
webinspect
-
Updated
Jun 28, 2019 - Java
A Github repository I created while studying the Software Security course on Coursera. I made the repository public to discuss solutions with like-minded developers.
-
Updated
Dec 13, 2020 - C
A simple Java command-line utility to mirror the entire contents of VulnDB.
-
Updated
Jun 17, 2021 - Java
Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)
security
obfuscation
compiler
reverse-engineering
obfuscator
software-security
llvm-clang
security-tools
data-obfuscation
securi
-
Updated
May 20, 2021 - C++
Repository of events for the Software Crafters Sydney community
meetup
software-engineering
software-quality
software-testing
software-security
software-architecture
software-design
-
Updated
Dec 11, 2020 - JavaScript
SIde-Channel Analysis toolKit: embedded security evaluation tools
security
embedded-systems
software-security
side-channel
hardware-hacking
security-automation
security-testing
hardware-security
differential-power-analysis
side-channel-attacks
embedded-security
correlation-power-analysis
test-vector-leakage-assesment
-
Updated
Jun 27, 2021 - C++
Attacking the Nintendo 3DS Boot ROMs
-
Updated
Feb 2, 2018 - TeX
《macOS软件安全与逆向分析》勘误
reverse-engineering
malware-analysis
binary-analysis
macho
ios-security
software-security
macos-security
-
Updated
Feb 8, 2018
A toolchain for software integrity protection including self-checksumming, control flow integrity, result checking, oblivious hashing and a sample program protected using Intel SGX
software-security
control-flow-integrity
software-integrity
tamperproofing
self-checksumming
oblivious-hashing
software-protection
-
Updated
Aug 20, 2017
-
Updated
Nov 2, 2017
My lab reports for some of the security labs developed by Prof. Du of SU.
-
Updated
May 16, 2019
Behavior based program partitioning for security enclaves
-
Updated
Feb 2, 2020 - C++
Software Security project - Malware Detection Analysis A.A. 2019/2020.
-
Updated
Jan 18, 2020 - Python
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
exploits
rop-exploitation
software-security
hijack
memory-corruption
rop-chain
arbitrary-code-execution
bypass-dep
bypass-stack-canaries
bypass-safeseh
-
Updated
Mar 4, 2019 - HTML
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
reverse-engineering
hacking
stack-overflow
binary-exploitation
software-security
memory-corruption
exploit-development
buffer-overflow-exploit
smash-the-stack
hijacking
shellcode-development
custom-shell
webserver-exploit
linux-x86-shellcode
arbitrary-code-execution
code-flow-hijack
binary-hacking
-
Updated
Feb 10, 2019 - C
Experiments with automatic software piracy detection utilising machine-learning classifiers for micro-signatures
-
Updated
Aug 29, 2019 - Python
This repository contains the exploits to Linux VM binaries provided by Exploits1 course by opensecuritytraining
hacking
binary-exploitation
software-security
buffer-overflow
exploit-development
hijacking
heap-overflow
arbitrary-code-execution
code-flow-hijack
custom-shellcoding
binary-hacking
-
Updated
May 7, 2019 - Python
aRustyDev
opened
May 21, 2021
Open
Update Discussions
1
Improve this page
Add a description, image, and links to the software-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the software-security topic, visit your repo's landing page and select "manage topics."
Current Behavior:
When viewing vulns in the Audit Vulnerabilities tab. the Analysis column appears to contain code (enum?) names, e.g. NOT_SET, FALSE_POSITIVE. This problem also occurs in Policy Violations tab.
Steps to Reproduce:
Open the Audit Vulnerabilities tab.
Expected Behavior:
The Analysis column contains language specific analysis values, e.g. Not Set, False Positive