BugAlertDotOrg / bugalertLinks
☆205Updated last year
Alternatives and similar repositories for bugalert
Users that are interested in bugalert are comparing it to the libraries listed below
Sorting:
- App that simplifies building decision trees to model adverse scenarios☆215Updated last year
- ☆243Updated last year
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆349Updated 2 months ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆121Updated last year
- External monitoring for organization assets☆410Updated last year
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- A checklist of practices for organizations dealing with account takeover (ATO)☆271Updated 10 months ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆354Updated last week
- boostsecurityio/poutine☆308Updated last week
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆297Updated this week
- Dorothy is a tool to test security monitoring and detection for Okta environments☆184Updated last year
- ☆417Updated 2 years ago
- Threat matrix for CI/CD Pipeline☆757Updated last year
- Documenting your Threat Models with HCL☆432Updated 2 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆286Updated 11 months ago
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆532Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆174Updated 8 months ago
- Segment's Threat Modeling training for our engineers☆245Updated 4 years ago
- OWASP Foundation Threat Dragon Project Web Repository☆82Updated last week
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆586Updated 8 months ago
- Graph-based security analysis for everyone☆349Updated last year
- threatspec - continuous threat modeling, through code☆362Updated 4 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆440Updated last month
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆292Updated last week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- OWASP Domain Protect - prevent subdomain takeover☆397Updated 7 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆239Updated last month
- Private key usage verification☆430Updated 4 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆189Updated 11 months ago