JLLeitschuh / security-checklist-transformerLinks
Sqreen Security Checklist Transformer & Uploader
☆29Updated 4 years ago
Alternatives and similar repositories for security-checklist-transformer
Users that are interested in security-checklist-transformer are comparing it to the libraries listed below
Sorting:
- OWASP Application Gateway is an HTTP proxy that handles Oauth2 authentication and session management☆84Updated last week
- ☆74Updated 5 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 8 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- A curated list of security tools for Hackers & Builders!☆98Updated last year
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 9 years ago
- A curated threat modeling library collection☆24Updated 2 years ago
- A static website template for security pages.☆53Updated 5 months ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- ☆10Updated 3 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 3 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆81Updated 4 years ago
- ZAP Management Scripts☆23Updated last week
- ☆18Updated 5 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last month
- ☆57Updated 5 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 3 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 3 years ago
- Monitors Github for leaked secrets☆204Updated last year
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- Static security checker for Dockerfiles☆95Updated last year
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 4 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 7 years ago