OWASP / OWASP-Learning-GatewayLinks
OWASP Learning Gateway Project
☆14Updated 2 years ago
Alternatives and similar repositories for OWASP-Learning-Gateway
Users that are interested in OWASP-Learning-Gateway are comparing it to the libraries listed below
Sorting:
- A MAL language that demonstrates the Maven project structure☆23Updated 2 weeks ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆18Updated 8 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Updated 7 years ago
- Threat Modeling Manifesto☆29Updated last year
- DefectDojo Documentation☆17Updated 4 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27Updated 6 years ago
- GSA Security Benchmarks and Tools☆21Updated 6 years ago
- Open Threat Modeling Template☆52Updated last year
- Repository for OWASP Code Review document☆17Updated 11 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 5 months ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Updated 3 months ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Updated 3 years ago
- OWASP Foundation Web Respository☆20Updated 3 months ago
- A curated threat modeling library collection☆24Updated 2 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- ☆21Updated 7 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- OWASP Foundation Web Respository☆28Updated last month
- OWASP Threat Dragon core files☆29Updated 4 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆96Updated last year
- OWASP Top Ten☆48Updated 4 years ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆20Updated 7 years ago
- DLT-Security-Framework☆17Updated 4 years ago
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- Legal, procedural and policies document templates for operating an IRT☆65Updated last year
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 7 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated 2 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Updated last year