This is a step-by-step guide to implementing a DevSecOps program for any size organization
☆2,037Dec 21, 2024Updated last year
Alternatives and similar repositories for DevSecOps-Playbook
Users that are interested in DevSecOps-Playbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ultimate DevSecOps library☆6,648Mar 5, 2026Updated 2 weeks ago
- ♾️ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe 😎☆2,097Mar 3, 2026Updated 2 weeks ago
- Checklist for container security - devsecops practices☆1,613Sep 15, 2025Updated 6 months ago
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆1,042Jan 5, 2026Updated 2 months ago
- Curating the best DevSecOps resources and tooling.☆1,643Aug 2, 2024Updated last year
- ☆569Updated this week
- An authoritative list of awesome devsecops tools with the help from community experiments and contributions.☆5,357May 11, 2024Updated last year
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,724Aug 2, 2024Updated last year
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,373Updated this week
- A project to visualize the software supply chain☆58Sep 9, 2023Updated 2 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆488Jun 12, 2025Updated 9 months ago
- Security Remediation Guides☆746Nov 24, 2025Updated 3 months ago
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,344Updated this week
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,414Oct 16, 2025Updated 5 months ago
- Open-Source Unified Vulnerability Management, DevSecOps & ASPM☆4,583Updated this week
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,447Nov 18, 2025Updated 4 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,283Mar 12, 2026Updated last week
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,207Jul 14, 2024Updated last year
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆688Updated this week
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,478Dec 31, 2025Updated 2 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,908Oct 1, 2025Updated 5 months ago
- Cloud Security Posture Management (CSPM)☆3,717Feb 23, 2026Updated last month
- Threat matrix for CI/CD Pipeline☆759Jul 8, 2024Updated last year
- A curated list of awesome Kubernetes security resources☆957Dec 15, 2023Updated 2 years ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,533Jan 28, 2026Updated last month
- Azure and AWS Attacks☆1,113Nov 25, 2022Updated 3 years ago
- Automating situational awareness for cloud penetration tests.☆2,309Mar 10, 2026Updated last week
- A curated list for Awesome Kubernetes Security resources☆1,993Updated this week
- A collection of awesome security hardening guides, tools and other resources☆6,219Jan 20, 2026Updated 2 months ago
- OWASP Foundation Web Respository☆602Updated this week
- Security Champions Playbook v 2.1☆392Sep 25, 2023Updated 2 years ago
- Multi-Cloud Security Auditing Tool☆7,579Sep 23, 2025Updated 6 months ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆770Dec 11, 2024Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,984May 20, 2025Updated 10 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,547Jul 28, 2024Updated last year
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,097Updated this week
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,658Nov 23, 2025Updated 3 months ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- ☆423Jan 18, 2023Updated 3 years ago