OpenSecuritySummit / oss2020Links
The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security
☆26Updated 4 years ago
Alternatives and similar repositories for oss2020
Users that are interested in oss2020 are comparing it to the libraries listed below
Sorting:
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- ZAP Management Scripts☆23Updated last week
- Collection of links to Security stuff☆115Updated 2 weeks ago
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- ☆67Updated 8 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- ☆21Updated 6 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last month
- Containerized pentesting tools☆45Updated 3 years ago
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆110Updated 7 months ago
- A static website template for security pages.☆52Updated last month
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Dockerfiles for security tools☆51Updated 9 months ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆29Updated 7 years ago
- OWASP Threat Dragon core files☆28Updated 4 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- ☆18Updated 5 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆75Updated 4 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Desktop variant of OWASP Threat Dragon☆77Updated 4 years ago
- A very vulnerable serverless application in AWS Lambda☆96Updated 5 years ago
- OWASP Foundation Web Respository☆28Updated last month
- The clever vulnerability dependency finder☆96Updated 3 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- Ansible Playbooks for Security Automation with Ansible2 book☆102Updated 7 years ago
- Repo to hold mapping of user-security-stories☆119Updated 6 years ago
- GCP and GSUITE security auditing scripts☆27Updated last year