Securing-DevOps / invoicer
The invoicer
☆16Updated 2 years ago
Alternatives and similar repositories for invoicer:
Users that are interested in invoicer are comparing it to the libraries listed below
- DEPRECATED - Propagate users from Mozilla's Person API to third party systems.☆40Updated 3 years ago
- Kali Linux, built from initial Debian Jessie, using Vagrant, for deployment to Amazon☆17Updated 8 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆78Updated 7 years ago
- Repository for various tools around security☆42Updated 8 months ago
- Auditing & Hardening script for Kubernetes☆45Updated 6 years ago
- Securing DevOps' logging pipeline, a dev environment for Mozilla Hindsight☆22Updated 6 years ago
- AWS Metadata Proxy for protection against SSRF☆67Updated 5 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- REST API test utility☆22Updated 5 years ago
- ☆66Updated 7 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Updated 5 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Updated 5 years ago
- [DEPRECATED] A quickstart demo for Kolide tools☆52Updated 6 years ago
- scan s3 buckets for security issues☆85Updated 8 months ago
- Open Security Summit 2018☆29Updated 4 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- Docker Enterprise Edition Security Controls for Compliance☆66Updated 2 years ago
- Blazing CloudTrail since 2018☆136Updated 6 years ago
- A very vulnerable serverless application in AWS Lambda☆95Updated 5 years ago
- this is a demo set of attacks that can be used to get started with gauntlt☆27Updated 9 years ago
- Get started with gauntlt right away with examples, install scripts and more☆51Updated 9 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- Creates a CloudFormation stack for running Security Monkey☆27Updated 6 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆22Updated 8 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- A Dockerfile that creates an image with known vulnerabilities.☆49Updated 3 years ago