NovatecConsulting / developer-security-training
All Labs of the Security for Developers Training
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for developer-security-training
- ☆36Updated 3 years ago
- OWASP Foundation Web Respository☆54Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- ☆18Updated 2 years ago
- Labs for Threat Modelling training delivered by ControlPlane☆29Updated 6 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆48Updated this week
- OWASP Foundation Web Respository☆37Updated 2 months ago
- ☆37Updated 7 months ago
- A secure spring boot based java service providing an API to store and retrieve browser bookmarks☆18Updated 5 months ago
- OWASP Foundation Web Respository☆79Updated 2 months ago
- ☆80Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated 11 months ago
- OWASP Kubernetes Security Testing Guide☆37Updated 2 months ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆19Updated last year
- Pin designs for security related items☆37Updated 6 months ago
- OWASP Foundation Web Respository☆27Updated 3 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Framework for API Maturity Assessment☆20Updated 4 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆169Updated this week
- ☆12Updated 3 years ago
- https://breaches.cloud☆36Updated last month
- OWASP Foundation Web Respository☆19Updated last month
- A full insecure kubernetes application for testing security tools☆54Updated this week
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".☆69Updated 2 years ago
- DefectDojo Community Content☆17Updated last month
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆61Updated 5 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆68Updated 6 months ago
- A ComplianceAsCode blog☆25Updated last week
- Systematic Universal Security Testing Orchestration☆37Updated 2 years ago
- Threat Modeling Manifesto☆27Updated 4 months ago