JLLeitschuh / security-checklist-transformerLinks
Sqreen Security Checklist Transformer & Uploader
☆27Updated 4 years ago
Alternatives and similar repositories for security-checklist-transformer
Users that are interested in security-checklist-transformer are comparing it to the libraries listed below
Sorting:
- OWASP Application Gateway is an HTTP proxy that handles Oauth2 authentication and session management☆85Updated 2 months ago
- ☆35Updated 4 years ago
- ☆74Updated 4 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 3 weeks ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- ZAP Management Scripts☆23Updated last month
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 2 months ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- Cloud Security Dashboard for AWS - based on ScoutSuite☆1Updated last year
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- Vendor Security Model Contract☆98Updated 3 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- Tools to automate AWS Cloud security assessments☆25Updated 5 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- A curated threat modeling library collection☆22Updated last year
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆12Updated last month
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆106Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- ☆20Updated 6 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- A curated list of security tools for Hackers & Builders!☆100Updated 11 months ago
- ☆57Updated 5 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Offensive Terraform Website☆45Updated 4 years ago