JLLeitschuh / security-checklist-transformerLinks
Sqreen Security Checklist Transformer & Uploader
β28Updated 4 years ago
Alternatives and similar repositories for security-checklist-transformer
Users that are interested in security-checklist-transformer are comparing it to the libraries listed below
Sorting:
- Serverless honeytoken π΅π»ββοΈβ81Updated 2 years ago
- OWASP Application Gateway is an HTTP proxy that handles Oauth2 authentication and session managementβ84Updated 6 months ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.β15Updated 4 years ago
- Updated incident response generator for training classesβ44Updated 4 years ago
- Tools to automate AWS Cloud security assessmentsβ24Updated 5 years ago
- Salesforce Policy Deviation Checkerβ30Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.β48Updated 9 years ago
- A command line security audit tool for Amazon Web Servicesβ82Updated 6 years ago
- β10Updated 3 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelinesβ108Updated 2 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.β81Updated 4 years ago
- A repository for wardley maps related to security topics.β46Updated 8 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.β78Updated 3 years ago
- β74Updated 5 years ago
- A Java library for programmatically calculating OWASP Risk Rating scoresβ19Updated 2 years ago
- OWASP Threat Dragon with Gitlab Integrationβ27Updated 8 years ago
- β77Updated 2 years ago
- A curated list of security tools for Hackers & Builders!β100Updated last year
- Offensive Terraform Websiteβ45Updated 5 years ago
- β18Updated 5 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple β¦β41Updated 5 years ago
- Scans every git push to your Github organisations to find unwanted secrets.β87Updated 7 months ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.β64Updated 6 years ago
- A static website template for security pages.β53Updated 4 months ago
- A curated threat modeling library collectionβ23Updated 2 years ago
- Dependency Combobulatorβ94Updated last year
- ZAP Management Scriptsβ23Updated 2 weeks ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, manβ¦β82Updated 4 years ago
- Vendor Security Model Contractβ98Updated 3 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.β54Updated this week