Grafeas defines an API spec for managing metadata about software resources, such as container images, Virtual Machine (VM) images, JAR files, and scripts. It provides a uniform way to audit and govern your software supply chain, allowing build, auditing, and compliance tools to store, query, and retrieve comprehensive metadata on software components of all kinds. Grafeas divides the metadata information into notes and occurrences, allowing third-party metadata providers to create and manage metadata on behalf of many customers. It also allows for fine-grained access control of different types of metadata.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Social news aggregation and discussion platform for cybersecurity professionals.
A project with Terraform and Ansible scripts to create an orchestrated BlueTeam Lab for testing attacks and forensic artifacts on Windows environment.
A collection of setup scripts for various security research tools with installers for tools like afl, angr, barf, and more.
A collection of binary tools for various purposes including linking, assembling, profiling, and more.
nudge4j is a tool to control Java applications from the browser and experiment with live code.
A microservice for string padding to prevent global issues like the left-pad incident.
Cybersecurity conference featuring talks on various hacking topics by industry experts.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.