OperationCode / on-belayLinks
A cross platform application for tracking mood
☆8Updated 7 years ago
Alternatives and similar repositories for on-belay
Users that are interested in on-belay are comparing it to the libraries listed below
Sorting:
- A microservice supporting PyBot, Resources API, and other features that the official back-end does not manage.☆15Updated 6 years ago
- Operation Code's Official Slackbot☆32Updated last year
- This repo outlines how to get started contributing to Operation Code, each of our projects, the language they are written in, and their p…☆339Updated last year
- An application to assist in the organization and prioritization of software security activities.☆139Updated 4 years ago
- ☆32Updated 4 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Updated 6 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆282Updated last month
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆162Updated 2 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆180Updated 6 years ago
- a Damn Vulnerable Serverless Application☆541Updated last year
- Security Documentation Builder☆364Updated last year
- goSDL☆523Updated 2 years ago
- Our open source website. We're on a mission to help the military community learn software development, enter the tech industry, and code …☆229Updated 7 years ago
- for AWS Security material☆248Updated 3 years ago
- Segment's Threat Modeling training for our engineers☆244Updated 4 years ago
- Security aspects of AWS products for the Security Specialist certification☆211Updated 3 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 10 months ago
- Open source demos, concept and guidance related to the AWS CIS Foundation framework.☆621Updated 5 years ago
- ☆66Updated 2 years ago
- The OWASP best practices and guidelines for Secrets Management☆8Updated 6 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆74Updated 4 years ago
- OWASP Serverless Top 10☆218Updated 4 years ago
- Red Team Scripts for AWS.☆169Updated 4 years ago
- Repo to hold mapping of user-security-stories☆119Updated 6 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated last year
- DevSecOps Working Group☆12Updated 5 years ago
- ☆156Updated 2 years ago
- A Continuous Threat Modeling methodology☆322Updated 3 years ago
- Example detection of compromise credentials in AWS☆122Updated 6 years ago