JLLeitschuh / security-checklist-transformer
Sqreen Security Checklist Transformer & Uploader
☆27Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for security-checklist-transformer
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- ZAP Management Scripts☆21Updated 2 weeks ago
- Slides from presentations I give!☆20Updated 6 months ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- Cloud Security Dashboard for AWS - based on ScoutSuite☆0Updated last year
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆11Updated 2 months ago
- ☆36Updated 3 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- A meta-database collecting resources that compile lists of breaches☆18Updated 3 weeks ago
- ☆14Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆21Updated last year
- ☆20Updated 6 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- Updated incident response generator for training classes☆42Updated 3 years ago
- OWASP Application Gateway is an HTTP proxy that handles Oauth2 authentication and session management☆83Updated 3 weeks ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆62Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- A curated list of security tools for Hackers & Builders!☆98Updated 4 months ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- CloudSplaining on AWS Managed Policies☆41Updated this week
- ☆21Updated 2 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- A curated collection of tools and resources for building security with a developer first approach.☆28Updated 2 years ago
- Kubernetes Security Testing Guide☆26Updated 7 months ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆46Updated 8 years ago