CloudSecurityAlliance / DLT-Security-Framework
DLT-Security-Framework
☆18Updated 3 years ago
Alternatives and similar repositories for DLT-Security-Framework:
Users that are interested in DLT-Security-Framework are comparing it to the libraries listed below
- Glossary of security terms☆12Updated 3 years ago
- OWASP Foundation Web Respository☆27Updated last month
- Threat Modeling Manifesto☆27Updated 6 months ago
- A curated threat modeling library collection☆22Updated last year
- Global Security Database Tools☆42Updated last year
- The Secure Coding Framework☆21Updated 4 years ago
- OWASP Foundation Web Respository☆28Updated 2 years ago
- OWASP Foundation Web Respository☆10Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- Maturity Model Collaborative project☆14Updated last year
- ☆10Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last month
- A MAL language that demonstrates the Maven project structure☆23Updated 2 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 8 months ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Containerized pentesting tools☆45Updated 2 years ago
- ☆22Updated 3 years ago
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- ☆14Updated 2 years ago
- ☆32Updated 2 years ago
- A tool for detecting sensitive data in code repositories☆14Updated 2 months ago
- ☆18Updated 3 years ago
- OWASP Foundation Web Respository☆27Updated 4 months ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- DefectDojo Documentation☆15Updated 3 years ago
- Open Threat Modeling Template☆49Updated 6 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago