OWASP / Security-ChampionsLinks
☆14Updated last week
Alternatives and similar repositories for Security-Champions
Users that are interested in Security-Champions are comparing it to the libraries listed below
Sorting:
- Terraform module for OWASP Domain Protect on AWS☆13Updated this week
- Open Source Risk Assessment Tool for Power Platform☆10Updated 2 months ago
- This project focuses on detecting cyberattacks using advanced analytical techniques and a deep learning model. It leverages structured da…☆10Updated 7 months ago
- A massive collection of Cybersecurity papers, guides and reports.☆10Updated 8 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆109Updated last year
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆40Updated last month
- A full insecure kubernetes application for testing security tools☆89Updated 5 months ago
- ☆61Updated 3 months ago
- OWASP Foundation Web Respository☆22Updated this week
- OWASP Foundation web repository☆401Updated 2 weeks ago
- ☆86Updated 8 months ago
- A web CTF for training developers in bug hunting and secure coding!☆99Updated 8 months ago
- OWASP Non-Human Identities Top 10☆38Updated 5 months ago
- Fork Threat Modeling Platform - Community☆25Updated 5 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆91Updated 3 weeks ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆66Updated 3 months ago
- Secrets scanner that understands code☆187Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated last week
- Global Cyber Policy Working Group☆86Updated last month
- A Broken Application - Very Vulnerable!☆172Updated last week
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- Core model including reused documentation☆98Updated 3 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆43Updated 2 months ago
- boostsecurityio/lotp☆133Updated 5 months ago
- LLM Testing Findings Templates☆73Updated last year
- This is a companion to the Security Engineer Questions☆206Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆128Updated 7 months ago
- materials we hand out☆147Updated 2 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆302Updated last month
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆232Updated 7 months ago