Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings
#

static-application-security-testing

Here are 12 public repositories matching this topic...

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Static Application Security Testing (SAST) Tools.

  • Updated Jul 6, 2024

A production-grade AWS DevSecOps Hybrid CI/CD Factory that enforces security and compliance at every stage of the software delivery lifecycle. Built with a hybrid IaC approach using Terraform for core platform infrastructure and CloudFormation for CI/CD orchestration.

  • Updated Nov 3, 2025
  • HCL

AWS native Static Application Security Testing (SAST) utility to find and eradicate vulnerable software packages stored in AWS CodeArtifact. Built for both real-time distributed and centralized deployments.

  • Updated Jan 20, 2021
  • Python

Bugsmirror MASST (Mobile Application Security Suite and Tools) is a comprehensive platform for end-to-end mobile application security. It offers threat detection tools for static, runtime, dynamic API testing and red teaming; robust app shielding solution for threat mitigation; threat visibility dashboard; & AI powered insight in a single platform.

  • Updated Sep 3, 2025

Improve this page

Add a description, image, and links to the static-application-security-testing topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the static-application-security-testing topic, visit your repo's landing page and select "manage topics."

Learn more

Morty Proxy This is a proxified and sanitized view of the page, visit original site.