OWASP Foundation Web Respository
☆27Dec 22, 2025Updated 4 months ago
Alternatives and similar repositories for www-project-threat-and-safeguard-matrix
Users that are interested in www-project-threat-and-safeguard-matrix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- Repo containing documentation and explanation for CSET's harm taxonomy of incidents from AIID.☆19Jun 21, 2024Updated last year
- hyperGRC is a lightweight, in-browser tool for managing compliance-as-code repositories in OpenControl format.☆29Jan 19, 2022Updated 4 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- RedSage: A Cybersecurity Generalist LLM (ICLR'26)☆42Updated this week
- OWASP Ontology-driven Threat Modelling framework☆43Jul 11, 2023Updated 2 years ago
- Get Dependabot Alerts from a repo☆13Jan 22, 2022Updated 4 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- The goal of this project is to provide the terraform's templates for the openwebinars's course☆10Oct 25, 2017Updated 8 years ago
- The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they in…☆21Jun 5, 2018Updated 7 years ago
- Automate vulnerability triage which prioritizes remediation over discovery☆21Updated this week
- OWASP Foundation Web Respository☆380Updated this week
- Integrates Xanitizer results into SonarQube☆21Aug 5, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- a place to have conversations about OpenControl projects☆17Apr 30, 2019Updated 7 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Feb 19, 2018Updated 8 years ago
- ☆20Aug 6, 2024Updated last year
- Guidance for Organization on AWS☆13Nov 26, 2025Updated 5 months ago
- ☆13Nov 5, 2024Updated last year
- A fork of APIviz with out of the box support for classes compiled with Java 8.☆10Apr 15, 2018Updated 8 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- Creates a CloudFormation stack for running Security Monkey☆27Mar 21, 2019Updated 7 years ago
- operator that tracks SelinuxPolicy objects in certain namespaces.☆12Jun 26, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆10Jan 7, 2023Updated 3 years ago
- Interactive CRQ Monte Carlo simulation tool for quantifying cybersecurity risk using FAIR methodology. Built for EU SMBs, vCISOs, and sec…☆30Dec 5, 2025Updated 4 months ago
- The SonarQube plugin for jQAssistant☆15Apr 13, 2026Updated 2 weeks ago
- This is a compilation of free resources for the AWS CDK.☆16Jun 2, 2025Updated 10 months ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- AWS Signer Plugin for Notation☆17Apr 21, 2026Updated last week
- ☆15Jul 20, 2023Updated 2 years ago
- Stakeholder analysis for business project management☆21Apr 14, 2025Updated last year
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- BoK on Systems Performance Engineering☆18Jan 23, 2018Updated 8 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆128Dec 5, 2023Updated 2 years ago
- Abusing StepFunctions so that I do not have to write any Lambda code.☆15Sep 22, 2021Updated 4 years ago
- Threat models, verification standards, and security controls for AI agent architectures. Built on OWASP AISVS and NIST AI RMF.☆21Feb 17, 2026Updated 2 months ago
- ☆11Aug 29, 2023Updated 2 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- A collection of Ansible roles and playbooks to provision, sketch and backup a network running Junos OS, without the need of manually feed…☆19Dec 8, 2022Updated 3 years ago