OWASP / Top-5-Machine-Learning-Risks
The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques. Description[edit | ed…
☆29Updated 6 years ago
Alternatives and similar repositories for Top-5-Machine-Learning-Risks:
Users that are interested in Top-5-Machine-Learning-Risks are comparing it to the libraries listed below
- ☆20Updated 6 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- AppSecPipeline Specification for DevOps automation.☆39Updated 2 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago
- Open Threat Modeling Template☆49Updated 7 months ago
- DefectDojo Documentation☆16Updated 3 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Updated 8 years ago
- Content for OWASP Summit 2017 site☆128Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- A Java library for parsing and programmatically using threat models☆79Updated 2 years ago
- A curated threat modeling library collection☆22Updated last year
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- ☆66Updated 7 years ago
- A very vulnerable serverless application in AWS Lambda☆94Updated 5 years ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- ZAP Management Scripts☆23Updated this week
- Open Security Summit 2019☆25Updated 4 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- ☆14Updated 7 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Updated 6 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆91Updated 9 months ago
- Containerized pentesting tools☆45Updated 2 years ago
- Scripts for AWS amusement...☆21Updated 2 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- Docker repository for OWTF (64-bit Kali)☆33Updated 4 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- OWASP Foundation Web Respository☆27Updated 2 weeks ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago