OWASP / www-project-wrongsecrets
OWASP Foundation Web Respository
☆18Updated last month
Alternatives and similar repositories for www-project-wrongsecrets:
Users that are interested in www-project-wrongsecrets are comparing it to the libraries listed below
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- ☆100Updated 3 weeks ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated last month
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 5 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆62Updated 9 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated this week
- OWASP Foundation Web Respository☆28Updated 8 months ago
- A CLI that scans for sensitive data in source code☆14Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A community collection of security reviews of open source software components.☆93Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- AI featured threat modeling and security review action☆43Updated 5 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- ☆18Updated 3 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆97Updated last year
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆75Updated 6 months ago
- Protect against subdomain takeover☆92Updated 11 months ago
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆77Updated 11 months ago
- The source files and tools needed to build the OWASP Cornucopia decks in various languages☆61Updated last week
- A full insecure kubernetes application for testing security tools☆70Updated this week
- GitGuardian Canary Tokens☆133Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 4 months ago
- ☆41Updated 2 months ago
- ☆33Updated 3 years ago
- A tool for preventing the installation of malicious PyPI and npm packages☆134Updated this week
- Core model including reused documentation☆96Updated 3 weeks ago
- ☆87Updated 3 years ago