OWASP / Top-5-Machine-Learning-Risks
The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques. Description[edit | ed…
☆29Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Top-5-Machine-Learning-Risks
- ☆20Updated 6 years ago
- AppSecPipeline Specification for DevOps automation.☆38Updated last year
- Open Security Summit 2018☆29Updated 4 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆46Updated 4 years ago
- Open Threat Modeling Template☆48Updated 4 months ago
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆81Updated 4 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆56Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆61Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆15Updated 7 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- ☆14Updated 7 years ago
- DefectDojo Documentation☆15Updated 3 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated last year
- Evading Snort Intrusion Detection System.☆75Updated 3 years ago
- Scripts for AWS amusement...☆20Updated 2 years ago
- Mobile Security testing Framework☆40Updated 6 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆46Updated 7 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆68Updated 4 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 4 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆71Updated 3 years ago
- OWASP Threat Dragon core files☆28Updated 3 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 5 years ago
- Repository for OWASP Code Review document☆16Updated 10 years ago
- Legal, procedural and policies document templates for operating an IRT☆63Updated 8 months ago