CloudSecurityAlliance / DLT-Security-FrameworkLinks
DLT-Security-Framework
☆17Updated 4 years ago
Alternatives and similar repositories for DLT-Security-Framework
Users that are interested in DLT-Security-Framework are comparing it to the libraries listed below
Sorting:
- Forensics acquisition framework designed to be extensible and secure☆123Updated 6 years ago
- A community collection of security reviews of open source software components.☆96Updated last year
- The Secure Coding Framework☆22Updated 5 years ago
- Glossary of security terms☆12Updated 4 years ago
- OWASP Learning Gateway Project☆14Updated 2 years ago
- Global Security Database Tools☆43Updated 2 years ago
- Containerized pentesting tools☆45Updated 3 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 6 months ago
- Threat Modeling Manifesto☆29Updated last year
- Golang installer for DefectDojo☆29Updated last year
- A curated threat modeling library collection☆24Updated 2 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 5 years ago
- OWASP Foundation Web Respository☆20Updated 3 months ago
- Blockchains. Destruction. Mayhem.☆50Updated 3 years ago
- A Blockchain And Smart Contract Based CTF☆17Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- Falcon Integration Gateway (FIG)☆21Updated 3 weeks ago
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- A tool to run nmap against each line in a script.☆17Updated 5 years ago
- Security scanning & static analysis tool☆93Updated last year
- InfoSec OpenAI Examples☆19Updated 2 years ago
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆111Updated last year
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆73Updated 6 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated 2 weeks ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Updated last month
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- Open Threat Modeling Template☆52Updated last year
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Updated 3 years ago