OWASP / www-project-cloud-native-application-security-top-10
OWASP Foundation Web Respository
☆34Updated 6 months ago
Alternatives and similar repositories for www-project-cloud-native-application-security-top-10:
Users that are interested in www-project-cloud-native-application-security-top-10 are comparing it to the libraries listed below
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Jekyll Files for cloudsecwiki.com☆51Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated last month
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆88Updated 2 years ago
- GCP cloud security CTF☆44Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- ☆34Updated 4 years ago
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- ☆22Updated 2 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆107Updated 5 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13Updated 9 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 5 years ago
- Virtual Security Operations Center☆50Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆85Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- Damn Vulnerable Java (EE) Application☆134Updated last year
- ☆90Updated 3 years ago
- ☆124Updated 8 months ago
- WAF bypass PoC☆46Updated last year
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 5 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 8 months ago