SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)
☆112Jan 29, 2025Updated last year
Alternatives and similar repositories for SEDATED
Users that are interested in SEDATED are comparing it to the libraries listed below
Sorting:
- ☆15Oct 8, 2025Updated 4 months ago
- This project is about creating and publishing threat model examples.☆428Nov 10, 2021Updated 4 years ago
- Watchdog allows to define custom hooks in YAML format. When attached to the official repository, some of these can serve as a way to enfo…☆12Mar 7, 2023Updated 2 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- An API that provides an interface to search complaint data.☆17Feb 3, 2026Updated 3 weeks ago
- An analytical framework for network traffic and behavioral analytics☆22Feb 23, 2023Updated 3 years ago
- ☆25Mar 13, 2021Updated 4 years ago
- threatspec - continuous threat modeling, through code☆379Dec 30, 2020Updated 5 years ago
- A community collection of security reviews of open source software components.☆97Feb 29, 2024Updated 2 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- A collection of BBRF agents that can be deployed to AWS lambda☆24Nov 17, 2024Updated last year
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Oct 3, 2020Updated 5 years ago
- ☆69Jul 18, 2025Updated 7 months ago
- Collection of operational focused osquery dashboards.☆11Jan 20, 2021Updated 5 years ago
- CDS Threat Modeling Tool MVP☆14Updated this week
- ☆12May 9, 2017Updated 8 years ago
- A TGIK (by Heptio) playlist in text form with reference to the individual show notes.☆15May 18, 2018Updated 7 years ago
- A secure way to code via Signal. Integrates long-term memory, ralph-style looping for complex specifics, and more all from your phone.☆115Updated this week
- Simple reverse shell over Slack☆57Apr 18, 2021Updated 4 years ago
- Toolbox spreadsheet for assessing maturity and definition of roadmap☆16Sep 18, 2024Updated last year
- OWASP Learning Gateway Project☆14Apr 18, 2023Updated 2 years ago
- Capture all RabbitMQ messages being sent through a broker.☆32Feb 13, 2021Updated 5 years ago
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆138Jun 7, 2025Updated 8 months ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 4 years ago
- Application Security Automation☆527Sep 5, 2023Updated 2 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆280Feb 17, 2026Updated last week
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆32Jan 14, 2025Updated last year
- ☆27Dec 6, 2013Updated 12 years ago
- A tool to hunt for credentials in github wild AKA git*hunt☆297Dec 8, 2022Updated 3 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Jan 23, 2025Updated last year
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- ☆13Mar 9, 2025Updated 11 months ago
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆21Dec 3, 2018Updated 7 years ago
- BDD Automated Security Tests for Web Applications☆568Nov 16, 2022Updated 3 years ago
- An open source, online threat modelling tool from OWASP☆484Jul 18, 2025Updated 7 months ago