OWASP / www-project-top-10-infrastructure-security-risksLinks
OWASP Top 10 Infrastructure Security Risks
☆41Updated this week
Alternatives and similar repositories for www-project-top-10-infrastructure-security-risks
Users that are interested in www-project-top-10-infrastructure-security-risks are comparing it to the libraries listed below
Sorting:
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 2 months ago
- A project to visualize the software supply chain☆53Updated 2 years ago
- ☆36Updated last week
- ☆113Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 3 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 11 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆59Updated last week
- InfoSec OpenAI Examples☆19Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆127Updated 7 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated 4 months ago
- ☆38Updated 9 months ago
- LLM Testing Findings Templates☆73Updated last year
- Tool for obfuscating and deobfuscating data.☆73Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- ☆41Updated this week
- ☆62Updated 4 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- 📚A curated list of product security resources.☆21Updated 4 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year
- Holds the public Hacking the Cloud CTFs.☆59Updated last year
- boostsecurityio/lotp☆136Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Updated 6 months ago
- AI Security Shared Responsibility Model☆75Updated 3 weeks ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 9 months ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆56Updated 4 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆67Updated 5 months ago
- software asset scanning orchestration system☆28Updated last week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆43Updated last week