OWASP / Top-5-Machine-Learning-RisksLinks
The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques. Description[edit | ed…
☆29Updated 7 years ago
Alternatives and similar repositories for Top-5-Machine-Learning-Risks
Users that are interested in Top-5-Machine-Learning-Risks are comparing it to the libraries listed below
Sorting:
- ☆21Updated 6 years ago
- Content for OWASP Summit 2017 site☆128Updated 4 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- Open Threat Modeling Template☆52Updated last year
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆110Updated 7 months ago
- Repo to hold mapping of user-security-stories☆119Updated 6 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- Microsoft Threat Modeling Template files☆193Updated 2 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆17Updated 8 years ago
- A Java library for parsing and programmatically using threat models☆81Updated 2 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated this week
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆181Updated 6 years ago
- A very vulnerable serverless application in AWS Lambda☆96Updated 5 years ago
- OWASP Learning Gateway Project☆14Updated 2 years ago
- a curated list of useful threat modeling resources☆139Updated last year
- ☆67Updated 8 years ago
- The Secure Coding Framework☆267Updated 5 years ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆183Updated this week
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last month
- SWAMP-in-a-Box☆62Updated 4 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- IriusRisk Community☆67Updated last year
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Updated 7 years ago