OWASP / Top-5-Machine-Learning-Risks
The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques. Description[edit | ed…
☆29Updated 6 years ago
Alternatives and similar repositories for Top-5-Machine-Learning-Risks:
Users that are interested in Top-5-Machine-Learning-Risks are comparing it to the libraries listed below
- ☆20Updated 6 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Open Threat Modeling Template☆50Updated 8 months ago
- AppSecPipeline Specification for DevOps automation.☆39Updated 2 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- A repository for wardley maps related to security topics.☆47Updated 8 years ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated last year
- A curated threat modeling library collection☆22Updated last year
- Content for OWASP Summit 2017 site☆128Updated 4 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆70Updated 5 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆47Updated 4 years ago
- Python API library for DefectDojo☆41Updated 2 years ago
- ☆15Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆100Updated last year
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆15Updated 8 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago
- Simple REST-style web service for the CVE searching☆97Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 3 months ago
- ☆66Updated 7 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆92Updated 10 months ago
- Open Security Summit 2018☆29Updated 4 years ago
- The clever vulnerability dependency finder☆96Updated 2 years ago
- This is a container of web applications that work with OWASP Bug Bounty for Projects☆32Updated 2 years ago
- Scripts for AWS amusement...☆21Updated 2 years ago