diff --git a/current-version/2-Process/2-3-Build/2-3-1-Static-Analysis/2-3-1-1-Static-Application-Security-Testing.md b/current-version/2-Process/2-3-Build/2-3-1-Static-Analysis/2-3-1-1-Static-Application-Security-Testing.md index 946e125..730b259 100644 --- a/current-version/2-Process/2-3-Build/2-3-1-Static-Analysis/2-3-1-1-Static-Application-Security-Testing.md +++ b/current-version/2-Process/2-3-Build/2-3-1-Static-Analysis/2-3-1-1-Static-Application-Security-Testing.md @@ -50,3 +50,5 @@ So according to the above lines the possible actions in this step are as follows ### Links [^1]: Listed in alphabetical order. + +- [AppSec Santa — SAST Tools Comparison](https://appsecsanta.com/sast-tools) - Independent comparison of 30+ SAST tools diff --git a/current-version/2-Process/2-3-Build/2-3-2-Software Composition Analysis/2-3-2-1-Software-Composition-Analysis.md b/current-version/2-Process/2-3-Build/2-3-2-Software Composition Analysis/2-3-2-1-Software-Composition-Analysis.md index 04cc33b..fde7b5e 100644 --- a/current-version/2-Process/2-3-Build/2-3-2-Software Composition Analysis/2-3-2-1-Software-Composition-Analysis.md +++ b/current-version/2-Process/2-3-Build/2-3-2-Software Composition Analysis/2-3-2-1-Software-Composition-Analysis.md @@ -69,3 +69,5 @@ Supply chain attacks involve exploiting vulnerabilities in the interconnected ne - [SBOM - OWASP](https://owasp.org/www-community/Component_Analysis#software-bill-of-materials-sbom) [^1]: Listed in alphabetical order. + +- [AppSec Santa — SCA Tools Comparison](https://appsecsanta.com/sca-tools) - Independent comparison of SCA tools with features and alternatives diff --git a/current-version/2-Process/2-4-Test/2-4-2-Dynamic-Application-Security-Testing.md b/current-version/2-Process/2-4-Test/2-4-2-Dynamic-Application-Security-Testing.md index 1a7df3d..ac1a8c2 100644 --- a/current-version/2-Process/2-4-Test/2-4-2-Dynamic-Application-Security-Testing.md +++ b/current-version/2-Process/2-4-Test/2-4-2-Dynamic-Application-Security-Testing.md @@ -41,3 +41,5 @@ DAST tools allow for extensive scans from the client side and server side withou - [RAPID7 - Dynamic Application Security Testing](https://www.rapid7.com/fundamentals/dast/) [^1]: Listed in alphabetical order. + +- [AppSec Santa — DAST Tools Comparison](https://appsecsanta.com/dast-tools) - Independent comparison of DAST tools with features and alternatives