#
software-security
Here are 47 public repositories matching this topic...
Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain
-
Updated
Dec 26, 2017 - TeX
Integrates Dependency-Check reports into SonarQube
security
sonarqube
owasp
visibility
vulnerabilities
appsec
component-analysis
nvd
sonar-plugin
software-security
vulnerable-components
-
Updated
Jan 4, 2021 - HTML
《macOS软件安全与逆向分析》随书源码
reverse-engineering
malware-analysis
binary-analysis
macho
ios-security
software-security
macos-security
-
Updated
Aug 9, 2017 - Objective-C
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
security
devops
security-audit
scala
sbt
static-analysis
owasp
sbt-plugin
infosec
vulnerabilities
cve
appsec
nvd
software-security
owasp-dependencycheck
vulnerability-scanners
security-automation
devsecops
software-composition-analysis
-
Updated
Jan 1, 2021 - Scala
A simple Java command-line utility to mirror the CVE JSON data from NIST.
-
Updated
Nov 19, 2020 - Java
Jenkins plugin for OWASP Dependency-Check. Inspects project components for known vulnerabilities (e.g. CVEs).
security
devops
owasp
jenkins-plugin
visibility
vulnerabilities
appsec
component-analysis
nvd
software-security
owasp-dependencycheck
adopt-this-plugin
-
Updated
Nov 2, 2020 - Java
A Java library for parsing and programmatically using threat models
-
Updated
Nov 19, 2020 - Java
Software Bill-of-Material (SBOM) specification designed for use in application security contexts and supply chain component analysis
component
bom
software
license
spdx
cpe
software-security
swid
swid-tags
bill-of-materials
software-bill-of-materials
sbom
cyclonedx
-
Updated
Jan 1, 2021 - XSLT
Integrates OWASP Zed Attack Proxy reports into SonarQube
-
Updated
Jan 3, 2021 - HTML
Vendor-Neutral Security Tool Automation Controller (over REST)
security
devops
automation
rest
zap
dynamic-analysis
burp
appspider
nessus
appsec
software-security
threadfix
webinspect
-
Updated
Jun 28, 2019 - Java
A Github repository I created while studying the Software Security course on Coursera. I made the repository public to discuss solutions with like-minded developers.
-
Updated
Dec 13, 2020 - C
A simple Java command-line utility to mirror the entire contents of VulnDB.
-
Updated
Dec 24, 2020 - Java
Repository of events for the Software Crafters Sydney community
meetup
software-engineering
software-quality
software-testing
software-security
software-architecture
software-design
-
Updated
Dec 11, 2020 - JavaScript
Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)
security
obfuscation
compiler
reverse-engineering
obfuscator
software-security
llvm-clang
security-tools
data-obfuscation
securi
-
Updated
Oct 5, 2018 - C++
SIde-Channel Analysis toolKit: embedded security evaluation tools
security
embedded-systems
software-security
side-channel
hardware-hacking
security-automation
security-testing
hardware-security
differential-power-analysis
side-channel-attacks
embedded-security
correlation-power-analysis
test-vector-leakage-assesment
-
Updated
Mar 10, 2020 - C++
《macOS软件安全与逆向分析》勘误
reverse-engineering
malware-analysis
binary-analysis
macho
ios-security
software-security
macos-security
-
Updated
Feb 8, 2018
Attacking the Nintendo 3DS Boot ROMs
-
Updated
Feb 2, 2018 - TeX
A toolchain for software integrity protection including self-checksumming, control flow integrity, result checking, oblivious hashing and a sample program protected using Intel SGX
software-security
control-flow-integrity
software-integrity
tamperproofing
self-checksumming
oblivious-hashing
software-protection
-
Updated
Aug 20, 2017
-
Updated
Nov 2, 2017
My lab reports for some of the security labs developed by Prof. Du of SU.
-
Updated
May 16, 2019
Behavior based program partitioning for security enclaves
-
Updated
Feb 2, 2020 - C++
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
exploits
rop-exploitation
software-security
hijack
memory-corruption
rop-chain
arbitrary-code-execution
bypass-dep
bypass-stack-canaries
bypass-safeseh
-
Updated
Mar 4, 2019 - HTML
Software Security project - Malware Detection Analysis A.A. 2019/2020.
-
Updated
Jan 18, 2020 - Python
Experiments with automatic software piracy detection utilising machine-learning classifiers for micro-signatures
-
Updated
Aug 29, 2019 - Python
This repository contains the exploits to Linux VM binaries provided by Exploits1 course by opensecuritytraining
hacking
binary-exploitation
software-security
buffer-overflow
exploit-development
hijacking
heap-overflow
arbitrary-code-execution
code-flow-hijack
custom-shellcoding
binary-hacking
-
Updated
May 7, 2019 - Python
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
reverse-engineering
hacking
stack-overflow
binary-exploitation
software-security
memory-corruption
exploit-development
buffer-overflow-exploit
smash-the-stack
hijacking
shellcode-development
custom-shell
webserver-exploit
linux-x86-shellcode
arbitrary-code-execution
code-flow-hijack
binary-hacking
-
Updated
Feb 10, 2019 - C
Repo for my golang practice that is wanted to be shared publicly via. every computer I ever access.
go
programming-language
golang
google-cloud
software
software-engineering
software-development
software-security
-
Updated
Feb 28, 2017 - Go
Improve this page
Add a description, image, and links to the software-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the software-security topic, visit your repo's landing page and select "manage topics."


The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number