P3tra-WP / Jupyter-ThreatLinks
☆14Updated 2 years ago
Alternatives and similar repositories for Jupyter-Threat
Users that are interested in Jupyter-Threat are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 years ago
- ☆41Updated 5 months ago
- Threat Modeling Manifesto☆28Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- Updated incident response generator for training classes☆44Updated 4 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- ☆35Updated 4 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 11 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated last month
- Cloud Security Dashboard for AWS - based on ScoutSuite☆1Updated 2 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆75Updated 4 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- ☆10Updated 3 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- ☆21Updated 3 years ago
- ☆66Updated 2 weeks ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- OWASP Foundation Web Respository☆28Updated last week
- OWASP Foundation Web Respository☆9Updated last month
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 months ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- AI featured threat modeling and security review action☆45Updated 8 months ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆77Updated 3 years ago
- IriusRisk Community☆66Updated last year
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- Systematic Universal Security Testing Orchestration☆37Updated 3 years ago