ASOS / threat-hunters-rpg
An interactive way to learn threat modeling
☆17Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for threat-hunters-rpg
- Slides from presentations I give!☆20Updated 6 months ago
- ☆20Updated 6 years ago
- Vendor Security Model Contract☆97Updated 2 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Updated 8 years ago
- Content for OWASP Summit 2017 site☆128Updated 4 years ago
- Misc resources and documents on my security research☆20Updated 7 years ago
- ☆18Updated 4 years ago
- Content for 'Measuring Software Quality using Application Security' book published at LeanPub☆38Updated 8 years ago
- A repository for wardley maps related to security topics.☆47Updated 7 years ago
- Git module to prevent from committing sensitive information into the repository.☆50Updated 7 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 6 years ago
- Building a community for those that both seek and wish to provide mentorship in Information Security.☆19Updated last year
- Demo - how to easily build security testing for Web App, using Zap and Glue☆58Updated 3 years ago
- ☆25Updated 6 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- ☆30Updated 3 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Updated incident response generator for training classes☆42Updated 3 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆56Updated 6 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated last year
- AWS Metadata Proxy for protection against SSRF☆68Updated 4 years ago
- ☆57Updated 4 years ago
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- ☆82Updated 4 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- TSLint rules for Angular☆18Updated 5 years ago