OWASP / www-project-cornucopiaLinks
OWASP Foundation Web Respository
☆28Updated last week
Alternatives and similar repositories for www-project-cornucopia
Users that are interested in www-project-cornucopia are comparing it to the libraries listed below
Sorting:
- Privacy Cards for Software Developers☆54Updated 6 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- A curated threat modeling library collection☆23Updated 2 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 3 years ago
- ☆14Updated 3 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 2 years ago
- OWASP Threat Dragon core files☆29Updated 4 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- ☆18Updated 5 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆93Updated 2 years ago
- Automated Enumeration Script for Pentesting☆34Updated 5 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- ☆69Updated 4 months ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆65Updated 2 years ago
- IriusRisk Community☆68Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Desktop variant of OWASP Threat Dragon☆78Updated 4 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 8 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- Tools for AWS forensics☆65Updated 9 years ago
- ☆68Updated 8 years ago
- GCP and GSUITE security auditing scripts☆27Updated last year