OWASP / Top-5-Machine-Learning-RisksLinks
The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques. Description[edit | ed…
☆29Updated 7 years ago
Alternatives and similar repositories for Top-5-Machine-Learning-Risks
Users that are interested in Top-5-Machine-Learning-Risks are comparing it to the libraries listed below
Sorting:
- ☆21Updated 6 years ago
- Open Threat Modeling Template☆52Updated last year
- Content for OWASP Summit 2017 site☆128Updated 4 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- OWASP Learning Gateway Project☆14Updated 2 years ago
- Repo to hold mapping of user-security-stories☆119Updated 6 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- The Secure Coding Framework☆267Updated 5 years ago
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆110Updated 7 months ago
- OWASP Threat Dragon core files☆28Updated 4 years ago
- ☆98Updated 3 months ago
- a curated list of useful threat modeling resources☆139Updated last year
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 2 months ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- A curated threat modeling library collection☆22Updated last year
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆280Updated this week
- ☆67Updated 8 years ago
- Python API library for DefectDojo☆42Updated 2 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆96Updated last year
- IriusRisk Community☆67Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- A very vulnerable serverless application in AWS Lambda☆96Updated 5 years ago
- ☆14Updated 8 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 3 weeks ago
- A Java library for parsing and programmatically using threat models☆81Updated 2 years ago