OWASP / SAMM-TOOLLinks
☆15Updated 4 years ago
Alternatives and similar repositories for SAMM-TOOL
Users that are interested in SAMM-TOOL are comparing it to the libraries listed below
Sorting:
- Repository for OWASP Code Review document☆16Updated 10 years ago
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆16Updated 10 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- ZAP Management Scripts☆23Updated 2 weeks ago
- ☆20Updated 6 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Updated 10 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆43Updated 11 months ago
- ZAP Admin☆29Updated last week
- Nessus Vulnerability visualization for the web☆30Updated 9 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆22Updated 12 years ago
- Advanced web server fingerprinting☆22Updated 7 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- Demonstration of OWASP top 10 vulnerabilities in ASP.NET MVC☆11Updated last month
- A composite score for one's GitHub quality.☆22Updated 3 years ago
- .Net library to create Maltego transformations.☆18Updated 3 months ago
- Clone of svn repository of http://insecurety.net/projects/web-malware/ project☆10Updated 10 years ago
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆12Updated 2 months ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆16Updated 8 months ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆29Updated 7 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆23Updated 8 years ago
- ☆40Updated 13 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- A curated threat modeling library collection☆22Updated last year
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Updated 5 years ago
- C# SDK for SecureAuth IdP API☆11Updated 2 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- A curated list of tools for incident response☆29Updated last year