OWASP / Cloud-Native-Application-Security-Top-10
☆20Updated 6 years ago
Alternatives and similar repositories for Cloud-Native-Application-Security-Top-10:
Users that are interested in Cloud-Native-Application-Security-Top-10 are comparing it to the libraries listed below
- AppSecPipeline Specification for DevOps automation.☆39Updated 2 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- ☆14Updated 7 years ago
- ☆35Updated 3 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Updated 8 years ago
- Repo to hold veracode related issues and code snippets☆9Updated 7 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- DefectDojo Documentation☆16Updated 3 years ago
- ZAP Management Scripts☆23Updated 2 weeks ago
- Serverless Workshop☆16Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 8 months ago
- Scripts for AWS amusement...☆21Updated 2 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- ☆25Updated 6 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 5 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆51Updated 2 years ago
- ☆10Updated 2 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆76Updated 4 years ago
- javaspringvulny - a Spring Boot web application built wrong on purpose☆19Updated this week
- Scripts that we use for pentesting☆42Updated 8 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago