OWASP / Top-5-Machine-Learning-RisksLinks
The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques. Description[edit | ed…
☆30Updated 7 years ago
Alternatives and similar repositories for Top-5-Machine-Learning-Risks
Users that are interested in Top-5-Machine-Learning-Risks are comparing it to the libraries listed below
Sorting:
- Open Threat Modeling Template☆52Updated last year
- ☆21Updated 7 years ago
- Content for OWASP Summit 2017 site☆129Updated 5 years ago
- Repo to hold mapping of user-security-stories☆119Updated 7 years ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- Open Security Summit 2018☆29Updated 5 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 3 years ago
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆111Updated last year
- Content for 'JIRA Risk Project' book published at LeanPub☆58Updated 7 years ago
- OWASP Learning Gateway Project☆14Updated 2 years ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆25Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆47Updated 9 years ago
- OWASP Threat Dragon core files☆29Updated 4 years ago
- DefectDojo Documentation☆17Updated 4 years ago
- Microsoft Threat Modeling Template files☆200Updated 3 years ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆186Updated 5 months ago
- ☆14Updated 8 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 6 months ago
- A very vulnerable serverless application in AWS Lambda☆98Updated 6 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- ☆68Updated 8 years ago
- The Secure Coding Framework☆271Updated 5 years ago
- a curated list of useful threat modeling resources☆143Updated last year
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆280Updated this week
- Open Security Summit 2019☆26Updated 5 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 5 months ago
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".☆71Updated 4 years ago
- A Java library for parsing and programmatically using threat models☆82Updated 2 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆127Updated 9 years ago