☆21Sep 25, 2018Updated 7 years ago
Alternatives and similar repositories for Cloud-Native-Application-Security-Top-10
Users that are interested in Cloud-Native-Application-Security-Top-10 are comparing it to the libraries listed below
Sorting:
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- ☆34Aug 13, 2021Updated 4 years ago
- ☆27Dec 6, 2013Updated 12 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- ☆14Jun 28, 2017Updated 8 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".☆71Jan 1, 2022Updated 4 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- ZAP Management Scripts☆23Updated this week
- Inspect SSL/TLS traffic using eBPF☆20Oct 19, 2024Updated last year
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- A collection of DoD and Federal Government Cloud Computing Resources☆49Mar 29, 2021Updated 4 years ago
- Kubernetes Initializer that injects the Istio sidecar into pods.☆24Jul 13, 2017Updated 8 years ago
- ☆53Dec 3, 2025Updated 3 months ago
- CVE database☆21Sep 2, 2020Updated 5 years ago
- A very vulnerable serverless application in AWS Lambda☆98Oct 7, 2019Updated 6 years ago
- Sample implementations for a Microservices/Nanoservices architecture based on Azure Serverless technologies.☆26Dec 9, 2022Updated 3 years ago
- A simple web app that helps developers understand the ASVS requirements. Now supporting ASVS 5.0☆163Nov 25, 2025Updated 3 months ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- ☆28Aug 6, 2020Updated 5 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- Demos for several kubernetes security features☆64Jan 9, 2025Updated last year
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- Kubernetes offensive framework built in eBPF☆39Mar 14, 2023Updated 2 years ago
- ☆36Apr 29, 2025Updated 10 months ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 weeks ago
- ☆83Dec 5, 2019Updated 6 years ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- HTML::Tidy is no longer being maintained. Please see the new project https://github.com/petdance/html-tidy5☆31Oct 2, 2018Updated 7 years ago
- Easily create authenticated data structures☆43Apr 11, 2023Updated 2 years ago
- A Burp extension to show the Collaborator client in a tab☆36Dec 23, 2022Updated 3 years ago