Content for 'JIRA Risk Project' book published at LeanPub
☆57Feb 17, 2018Updated 8 years ago
Alternatives and similar repositories for Book_SecDevOps_Risk_Workflow
Users that are interested in Book_SecDevOps_Risk_Workflow are comparing it to the libraries listed below
Sorting:
- Content for 'Measuring Software Quality using Application Security' book published at LeanPub☆39Nov 6, 2016Updated 9 years ago
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 9 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- With this tool, projects can be compiled easily for fuzzing with AFL or for static code analysis with tools like CBMC. One-line-scan hook…☆21Jan 3, 2023Updated 3 years ago
- An application to assist in the organization and prioritization of software security activities.☆139Jun 10, 2021Updated 4 years ago
- ☆13May 30, 2017Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- ☆12May 9, 2017Updated 8 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- ☆29Jan 31, 2025Updated last year
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆46Apr 12, 2018Updated 7 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 2 years ago
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- LFI scan, exploit tool☆13Nov 19, 2014Updated 11 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- Liferay puppet example☆15Feb 9, 2015Updated 11 years ago
- A Maven dependency graph generator for Bazel☆17Jan 7, 2026Updated last month
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Dec 7, 2018Updated 7 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- Highlight Burp proxy requests made by different browsers☆29Sep 21, 2017Updated 8 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- RESTful interface to your operating system shell☆19Nov 8, 2017Updated 8 years ago
- Providence is a system for code commit & bug system monitoring. It is deployed within an organization to monitor code commits for securit…☆71Feb 12, 2022Updated 4 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Build locally, deploy to any cloud, Automate all configurations...☆17Mar 25, 2020Updated 5 years ago