#
software-security
Here are 53 public repositories matching this topic...
Integrates Dependency-Check reports into SonarQube
security
sonarqube
owasp
visibility
vulnerabilities
appsec
component-analysis
nvd
sonar-plugin
software-security
vulnerable-components
-
Updated
Sep 17, 2021 - HTML
Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain
-
Updated
Dec 26, 2017 - TeX
《macOS软件安全与逆向分析》随书源码
reverse-engineering
malware-analysis
binary-analysis
macho
ios-security
software-security
macos-security
-
Updated
Aug 9, 2017 - Objective-C
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
security
devops
security-audit
scala
sbt
static-analysis
owasp
sbt-plugin
infosec
vulnerabilities
cve
appsec
nvd
software-security
owasp-dependencycheck
vulnerability-scanners
security-automation
devsecops
software-composition-analysis
-
Updated
Sep 4, 2021 - Scala
A simple Java command-line utility to mirror the CVE JSON data from NIST.
-
Updated
Sep 8, 2021 - Java
Jenkins plugin for OWASP Dependency-Check. Inspects project components for known vulnerabilities (e.g. CVEs).
security
devops
owasp
jenkins-plugin
visibility
vulnerabilities
appsec
component-analysis
nvd
software-security
owasp-dependencycheck
adopt-this-plugin
-
Updated
Aug 6, 2021 - Java
Software Bill of Material (SBOM) standard designed for use in application security contexts and supply chain component analysis
component
supply-chain
owasp
specification
standard
bom
software
license
spdx
cpe
software-security
swid
swid-tags
bill-of-materials
software-bill-of-materials
sbom
cyclonedx
-
Updated
Sep 16, 2021 - XSLT
A Java library for parsing and programmatically using threat models
-
Updated
Sep 8, 2021 - Java
Integrates OWASP Zed Attack Proxy reports into SonarQube
-
Updated
Aug 12, 2021 - HTML
Vendor-Neutral Security Tool Automation Controller (over REST)
security
devops
automation
rest
zap
dynamic-analysis
burp
appspider
nessus
appsec
software-security
threadfix
webinspect
-
Updated
Jun 28, 2019 - Java
A Github repository I created while studying the Software Security course on Coursera. I made the repository public to discuss solutions with like-minded developers.
-
Updated
Jul 8, 2021 - C
A simple Java command-line utility to mirror the entire contents of VulnDB.
-
Updated
Sep 13, 2021 - Java
Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)
security
obfuscation
compiler
reverse-engineering
obfuscator
software-security
llvm-clang
security-tools
data-obfuscation
securi
-
Updated
May 20, 2021 - C++
SIde-Channel Analysis toolKit: embedded security evaluation tools
security
embedded-systems
software-security
side-channel
hardware-hacking
security-automation
security-testing
hardware-security
differential-power-analysis
side-channel-attacks
embedded-security
correlation-power-analysis
test-vector-leakage-assesment
-
Updated
Jun 27, 2021 - C++
Repository of events for the Software Crafters Sydney community
meetup
software-engineering
software-quality
software-testing
software-security
software-architecture
software-design
-
Updated
Sep 1, 2021 - JavaScript
Attacking the Nintendo 3DS Boot ROMs
-
Updated
Feb 2, 2018 - TeX
《macOS软件安全与逆向分析》勘误
reverse-engineering
malware-analysis
binary-analysis
macho
ios-security
software-security
macos-security
-
Updated
Feb 8, 2018
A toolchain for software integrity protection including self-checksumming, control flow integrity, result checking, oblivious hashing and a sample program protected using Intel SGX
software-security
control-flow-integrity
software-integrity
tamperproofing
self-checksumming
oblivious-hashing
software-protection
-
Updated
Aug 20, 2017
-
Updated
Nov 2, 2017
Behavior based program partitioning for security enclaves
-
Updated
Feb 2, 2020 - C++
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
exploits
rop-exploitation
software-security
hijack
memory-corruption
rop-chain
arbitrary-code-execution
bypass-dep
bypass-stack-canaries
bypass-safeseh
-
Updated
Mar 4, 2019 - HTML
Software Security project - Malware Detection Analysis A.A. 2019/2020.
-
Updated
Jan 18, 2020 - Python
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
reverse-engineering
hacking
stack-overflow
binary-exploitation
software-security
memory-corruption
exploit-development
buffer-overflow-exploit
smash-the-stack
hijacking
shellcode-development
custom-shell
webserver-exploit
linux-x86-shellcode
arbitrary-code-execution
code-flow-hijack
binary-hacking
-
Updated
Feb 10, 2019 - C
My lab reports for some of the security labs developed by Prof. Du of SU.
-
Updated
May 16, 2019
This repository contains the exploits to Linux VM binaries provided by Exploits1 course by opensecuritytraining
hacking
binary-exploitation
software-security
buffer-overflow
exploit-development
hijacking
heap-overflow
arbitrary-code-execution
code-flow-hijack
custom-shellcoding
binary-hacking
-
Updated
May 7, 2019 - Python
Solutions to Software Security course provided by University of Maryland - Coursera
-
Updated
Dec 19, 2020
Placeholder for materials related to the course titled 'Software and Systems Security' taught by Akond Rahman
-
Updated
Sep 16, 2021 - Python
Improve this page
Add a description, image, and links to the software-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the software-security topic, visit your repo's landing page and select "manage topics."
The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number