Content for 'JIRA Risk Project' book published at LeanPub
☆57Feb 17, 2018Updated 8 years ago
Alternatives and similar repositories for Book_SecDevOps_Risk_Workflow
Users that are interested in Book_SecDevOps_Risk_Workflow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 9 years ago
- ☆10Apr 11, 2020Updated 5 years ago
- An application to assist in the organization and prioritization of software security activities.☆139Jun 10, 2021Updated 4 years ago
- Simple Docker container management, including automatic reverse proxy, private registry, host management, and more.☆27Jan 11, 2023Updated 3 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 3 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆29Sep 21, 2017Updated 8 years ago
- A Maven dependency graph generator for Bazel☆17Jan 7, 2026Updated 2 months ago
- A golang package for retrieving values from the Microsoft LDAP property, `UserAccountControl`☆16Oct 28, 2021Updated 4 years ago
- Stækka Metasploit - Extenting Metasploit☆54Jul 7, 2017Updated 8 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- ☆29Jan 31, 2025Updated last year
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- Misc resources and documents on my security research☆21Jan 25, 2017Updated 9 years ago
- OWASP Top Ten☆48Sep 24, 2021Updated 4 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Dec 7, 2018Updated 7 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Liferay puppet example☆15Feb 9, 2015Updated 11 years ago
- Manual deployment of JupyterHub on Kubernetes for a single machine☆15Mar 1, 2023Updated 3 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- YSOSERIAL Integration with burp suite☆165Dec 16, 2022Updated 3 years ago
- Auditing & Hardening script for Kubernetes☆45Apr 12, 2018Updated 7 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Nov 18, 2019Updated 6 years ago
- ☆18Apr 21, 2020Updated 5 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- A Go (golang) Utility package for decoding Active Directory objectSID☆26Nov 26, 2019Updated 6 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- A simple ssh private key password recovery tool written in Go☆22Dec 21, 2023Updated 2 years ago
- ☆23May 22, 2023Updated 2 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago