OWASP / www-project-top-10-ci-cd-security-risksLinks
OWASP Foundation Web Respository
☆99Updated last week
Alternatives and similar repositories for www-project-top-10-ci-cd-security-risks
Users that are interested in www-project-top-10-ci-cd-security-risks are comparing it to the libraries listed below
Sorting:
- A full insecure kubernetes application for testing security tools☆89Updated 6 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- ☆191Updated 6 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 11 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆289Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆73Updated 2 weeks ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆111Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- GitGuardian Canary Tokens☆145Updated 3 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 3 months ago
- OWASP Foundation Web Respository☆56Updated 2 weeks ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆116Updated last month
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆168Updated this week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆43Updated 2 weeks ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆96Updated 5 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆137Updated last year
- A utility to (re-)import findings and language data into DefectDojo☆43Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆77Updated last year
- The security workflow engine!☆126Updated last week
- ☆62Updated 4 months ago
- ☆123Updated last week
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆362Updated last month
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆310Updated 2 weeks ago
- ☆418Updated 2 years ago
- An AWS IAM policy statement parser and query tool.☆194Updated 3 months ago
- Protect against subdomain takeover☆94Updated 3 months ago
- boostsecurityio/lotp☆136Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆211Updated this week
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆80Updated 3 months ago