DevSlop / pixi-crsLinks
CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.
☆15Updated 4 years ago
Alternatives and similar repositories for pixi-crs
Users that are interested in pixi-crs are comparing it to the libraries listed below
Sorting:
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- ZAP Management Scripts☆23Updated this week
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Updated 6 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- ☆20Updated 6 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- OWASP Foundation Web Respository☆27Updated last week
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆75Updated 4 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆110Updated 6 months ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 3 weeks ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 12 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- ☆27Updated 2 months ago
- ☆66Updated 2 weeks ago
- A very vulnerable serverless application in AWS Lambda☆96Updated 5 years ago
- ☆16Updated 8 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- The clever vulnerability dependency finder☆97Updated 3 years ago
- Threat Modeling Manifesto☆28Updated last year
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- Route53/CloudFront Vulnerability Assessment Utility☆86Updated last year
- Privacy Cards for Software Developers☆53Updated 6 years ago