CloudSecurityAlliance / DLT-Security-FrameworkLinks
DLT-Security-Framework
☆17Updated 4 years ago
Alternatives and similar repositories for DLT-Security-Framework
Users that are interested in DLT-Security-Framework are comparing it to the libraries listed below
Sorting:
- OWASP Learning Gateway Project☆14Updated 2 years ago
- Glossary of security terms☆12Updated 3 years ago
- Threat Modeling Manifesto☆29Updated last year
- The Secure Coding Framework☆22Updated 5 years ago
- A curated threat modeling library collection☆22Updated last year
- A community collection of security reviews of open source software components.☆95Updated last year
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- OWASP Foundation Web Respository☆28Updated last month
- Global Security Database Tools☆43Updated last year
- Containerized pentesting tools☆45Updated 3 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last month
- Open Threat Modeling Template☆52Updated last year
- OWASP Foundation Web Respository☆19Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- IriusRisk Community☆67Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- OWASP Foundation Threat Dragon Project Web Repository☆82Updated this week
- DefectDojo Documentation☆17Updated 3 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆70Updated 5 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- a curated list of useful threat modeling resources☆139Updated last year
- Privacy Cards for Software Developers☆53Updated 6 years ago
- Golang installer for DefectDojo☆28Updated 7 months ago
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆110Updated 7 months ago
- ☆14Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Training scenarios for cyber ranges☆12Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago