The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security
☆26Oct 3, 2020Updated 5 years ago
Alternatives and similar repositories for oss2020
Users that are interested in oss2020 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- DevSecOps Guide, located devsecops.pagerduty.com☆14Apr 1, 2026Updated last month
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- OWASP Foundation Web Respository☆28Dec 22, 2025Updated 4 months ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆19Oct 18, 2016Updated 9 years ago
- Example of using Gauge and OWASP ZAP for test automation☆11Jan 9, 2020Updated 6 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- OWASP Kubernetes Security Testing Guide☆43Dec 22, 2025Updated 4 months ago
- SecStory (Security Story) adalah buku digital yang berisi kumpulan donasi cerita, ditulis oleh para pemangku kepentingan keamanan siber d…☆71May 24, 2019Updated 6 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆24Nov 8, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 7 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- ☆56May 9, 2026Updated last week
- ☆13May 30, 2017Updated 8 years ago
- ☆30Aug 15, 2021Updated 4 years ago
- ☆35Jan 22, 2026Updated 3 months ago
- Go library to shutdown your goroutines gracefully and in a timely manner☆13Feb 27, 2023Updated 3 years ago
- Test/Demo SIREKAP digits recognition☆10Feb 23, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆10Sep 11, 2020Updated 5 years ago
- Skype extension for WakaTime☆12Feb 5, 2015Updated 11 years ago
- Mana base probability calculator for MTG☆12Dec 5, 2022Updated 3 years ago
- The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored…☆16Jul 23, 2020Updated 5 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- https://github.com/BlankOn/Verbeek/projects/1☆23Feb 9, 2024Updated 2 years ago
- Reactor hands on generative AI workshop with Azure OpenAI☆10Jan 30, 2024Updated 2 years ago
- ZAP test code☆14May 7, 2015Updated 11 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Jun 26, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Echo Hack The Talk Materials 2019☆12Sep 12, 2019Updated 6 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 3 years ago
- Indihome Hash Decrypter Generator adalah alat yang digunakan untuk membuat hash serta melakukan brute-force untuk mencoba menemukan kemba…☆12Nov 24, 2025Updated 5 months ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- OpenNebula's visualization add-on allowing to have at a glance, an insight on the load of managed hosts (CPU usage/used, Memory usage/use…☆10Oct 18, 2018Updated 7 years ago
- Orchestrator managing Erlang containers and routing Erlang Distribution through itself.☆13Dec 19, 2025Updated 5 months ago
- Ruby on Rails app. untuk pencatatan data perhari berkenaan tentang "Situasi COVID-19" pada website KemKes.☆11Mar 8, 2023Updated 3 years ago