Content for 'JIRA Risk Project' book published at LeanPub
☆57Feb 17, 2018Updated 8 years ago
Alternatives and similar repositories for Book_SecDevOps_Risk_Workflow
Users that are interested in Book_SecDevOps_Risk_Workflow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 9 years ago
- ☆10Apr 11, 2020Updated 6 years ago
- An application to assist in the organization and prioritization of software security activities.☆139Jun 10, 2021Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple Docker container management, including automatic reverse proxy, private registry, host management, and more.☆27Jan 11, 2023Updated 3 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- Build locally, deploy to any cloud, Automate all configurations...☆17Mar 25, 2020Updated 6 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 3 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 7 years ago
- Repository characteristics☆14Updated this week
- Highlight Burp proxy requests made by different browsers☆29Sep 21, 2017Updated 8 years ago
- A Maven dependency graph generator for Bazel☆17Apr 4, 2026Updated last week
- A golang package for retrieving values from the Microsoft LDAP property, `UserAccountControl`☆16Oct 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Stækka Metasploit - Extenting Metasploit☆54Jul 7, 2017Updated 8 years ago
- ☆29Jan 31, 2025Updated last year
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Misc resources and documents on my security research☆21Jan 25, 2017Updated 9 years ago
- OWASP Top Ten☆48Sep 24, 2021Updated 4 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Liferay puppet example☆15Feb 9, 2015Updated 11 years ago
- YSOSERIAL Integration with burp suite☆165Dec 16, 2022Updated 3 years ago
- Auditing & Hardening script for Kubernetes☆45Apr 12, 2018Updated 8 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Nov 18, 2019Updated 6 years ago
- ☆18Apr 21, 2020Updated 5 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- React component for rendering RDF graphs and datasets using n3.js and cytoscape.js☆10Nov 8, 2021Updated 4 years ago
- A Go (golang) Utility package for decoding Active Directory objectSID☆26Nov 26, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- cve-2014-0130 rails directory traversal vuln☆18May 15, 2017Updated 8 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- ☆11Mar 25, 2026Updated 2 weeks ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago