DevSlop / pixi-crs
CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.
☆15Updated 3 years ago
Alternatives and similar repositories for pixi-crs:
Users that are interested in pixi-crs are comparing it to the libraries listed below
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- OWASP Threat Dragon with Gitlab Integration☆26Updated 7 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Updated 8 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- Updated incident response generator for training classes☆44Updated 3 years ago
- ☆20Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- OWASP Foundation Web Respository☆27Updated 2 months ago
- OWASP Threat Dragon core files☆28Updated 3 years ago
- A curated threat modeling library collection☆22Updated last year
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Updated 6 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- Threat Modeling Manifesto☆28Updated 9 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Pin designs for security related items☆37Updated 11 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆15Updated this week
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- ☆35Updated 3 years ago
- ☆10Updated 2 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Privacy Cards for Software Developers☆52Updated 5 years ago
- ☆57Updated 4 years ago
- OWASP Kubernetes Security Testing Guide☆37Updated 8 months ago
- InfoSec OpenAI Examples☆19Updated last year