NovatecConsulting / developer-security-training
All Labs of the Security for Developers Training
☆10Updated last year
Alternatives and similar repositories for developer-security-training:
Users that are interested in developer-security-training are comparing it to the libraries listed below
- Sunshine - SBOM visualization tool☆31Updated this week
- A utility to (re-)import findings and language data into DefectDojo☆42Updated 4 months ago
- ☆36Updated 3 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆54Updated last week
- OWASP Foundation Web Respository☆54Updated last year
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆75Updated this week
- OWASP Foundation Web Respository☆42Updated 4 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆70Updated 8 months ago
- Audit Dependency-Track findings and policy violations via policy as code☆32Updated last week
- A full insecure kubernetes application for testing security tools☆64Updated last week
- ☆18Updated 3 years ago
- Labs for Threat Modelling training delivered by ControlPlane☆30Updated 9 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- ☆38Updated 9 months ago
- ☆82Updated 3 years ago
- A secure spring boot based java service providing an API to store and retrieve browser bookmarks☆18Updated 7 months ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- OWASP Foundation Web Respository☆81Updated last week
- ☆113Updated 7 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated last year
- OWASP Foundation Web Respository☆27Updated 5 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆48Updated 6 months ago
- Sample scan files for testing DefectDojo imports☆75Updated last week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆62Updated 7 months ago
- ☆13Updated 5 months ago
- A project to visualize the software supply chain☆38Updated last year
- A deliberately vulnerable java app for educational purposes☆17Updated 10 months ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 8 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆49Updated 2 weeks ago
- OWASP Kubernetes Security Testing Guide☆37Updated 4 months ago