Equal Experts Secure Delivery Playbook
☆26Feb 21, 2023Updated 3 years ago
Alternatives and similar repositories for secure-delivery-playbook
Users that are interested in secure-delivery-playbook are comparing it to the libraries listed below
Sorting:
- Pin designs for security related items☆37Feb 16, 2026Updated 2 weeks ago
- PTF-based data plane tests for ONOS fabric.p4☆15Aug 6, 2021Updated 4 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Sep 22, 2018Updated 7 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- Python library for connecting to Chatango chat servers.☆21Feb 1, 2024Updated 2 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- CVE database☆21Sep 2, 2020Updated 5 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- Security contract types☆60Oct 4, 2022Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- ☆57Jun 17, 2020Updated 5 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- ☆28Aug 6, 2020Updated 5 years ago
- Source code for 'Linux Kernel Networking' by Rami Rosen☆28Mar 28, 2017Updated 8 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆280Feb 17, 2026Updated 2 weeks ago
- RELK -- The Research Elastic Stack (Kafka, Beats, Zookeeper, Logstash, ElasticSearch, Kibana, Spark, & Jupyter -- All in Docker)☆27Nov 7, 2019Updated 6 years ago
- ☆36Apr 29, 2025Updated 10 months ago
- Kubernetes offensive framework built in eBPF☆39Mar 14, 2023Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- Automated Enumeration Script for Pentesting☆34Aug 14, 2020Updated 5 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- Keys to activate any microsoft product like Windows, Office and Windows Server☆10Sep 4, 2021Updated 4 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- A clone of Airbnb website done using HTML and CSS.☆15Jan 22, 2019Updated 7 years ago
- Slides of IT-Security Meetup Kassel☆37Oct 22, 2024Updated last year
- Tomcat Installer Plugin For cPanel (Shared Hosting Control Panel)☆11Mar 22, 2017Updated 8 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago