OWASP / www-project-devsecops-verification-standard
OWASP Foundation Web Respository
☆43Updated 5 months ago
Alternatives and similar repositories for www-project-devsecops-verification-standard:
Users that are interested in www-project-devsecops-verification-standard are comparing it to the libraries listed below
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆137Updated last month
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆89Updated 11 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆101Updated 3 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆62Updated 8 months ago
- boostsecurityio/lotp☆112Updated this week
- ☆163Updated 5 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆102Updated 9 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆71Updated 9 months ago
- Awesome resources about Security in Kubernetes☆41Updated 2 years ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆85Updated this week
- ☆33Updated 2 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆100Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆102Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆27Updated last week
- A tool to uncover undocumented APIs from the AWS Console.☆95Updated 3 months ago
- ☆175Updated 2 months ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆167Updated this week
- ☆38Updated 10 months ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆18Updated last year
- A full insecure kubernetes application for testing security tools☆66Updated this week
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆67Updated 9 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆35Updated last month
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 4 months ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆164Updated 3 months ago
- Protect against subdomain takeover☆92Updated 8 months ago
- ☆109Updated last year