NovatecConsulting / developer-security-trainingLinks
All Labs of the Security for Developers Training
☆10Updated 2 years ago
Alternatives and similar repositories for developer-security-training
Users that are interested in developer-security-training are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆100Updated this week
- OWASP Foundation Web Respository☆56Updated last month
- A deliberately vulnerable java app for educational purposes☆19Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆74Updated last month
- ☆88Updated 4 years ago
- A deliberately vulnerable Kubernetes cluster☆130Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 5 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated this week
- An Awesome List of Log4Shell resources to help you stay informed and secure! 🔒☆233Updated 3 years ago
- ☆63Updated 5 months ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆163Updated 4 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆111Updated last year
- OWASP Foundation Web Respository☆47Updated 3 weeks ago
- APIsec|SCAN - Free API security testing using Github actions☆102Updated last year
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆299Updated last week
- OWASP Kubernetes security and compliance tool [WIP]☆107Updated 2 years ago
- A utility to (re-)import findings and language data into DefectDojo☆43Updated last year
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆240Updated this week
- Curated list of security tools☆68Updated last year
- A Java library for calculating CVSSv2, CVSSv3, and CVSSv4 scores and vectors☆49Updated last week
- Sample scan files for testing DefectDojo imports☆84Updated 3 months ago
- Labs for Threat Modelling training delivered by ControlPlane☆34Updated last year
- ☆124Updated 2 years ago
- A cli that can be used to query various online vulnerability sources such as the NVD or GHSA. The CLI and docker images can be used to mi…☆153Updated this week
- DevSecOps Pipeline using SAST + DAST and SCA tools☆71Updated last month
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated last year
- Examples of various Entra ID scenarios in Terraform☆17Updated last year
- Tool to detect secrets in source code management systems.☆163Updated 5 months ago
- OWASP Foundation Threat Dragon Project Web Repository☆84Updated last week