Securing-DevOps / invoicer
The invoicer
☆15Updated last year
Related projects ⓘ
Alternatives and complementary repositories for invoicer
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 6 years ago
- DEPRECATED - Propagate users from Mozilla's Person API to third party systems.☆40Updated 2 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 10 years ago
- Docker Enterprise Edition Security Controls for Compliance☆66Updated 2 years ago
- ☆14Updated 7 years ago
- REST API test utility☆23Updated 5 years ago
- Scripts for AWS amusement...☆20Updated 2 years ago
- AppSecPipeline Specification for DevOps automation.☆38Updated last year
- Content for 'JIRA Risk Project' book published at LeanPub☆56Updated 6 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆22Updated 7 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆35Updated 7 years ago
- ☆20Updated 6 years ago
- Get started with gauntlt right away with examples, install scripts and more☆51Updated 9 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Open Security Summit 2018☆29Updated 3 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆37Updated 4 years ago
- INACTIVE - Security Testing Tool☆106Updated 8 years ago
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- AWS risky security change detector based on EDDA.☆82Updated 5 years ago
- ☆11Updated 8 years ago
- Google Cloud Platform Security Tool☆232Updated 5 years ago
- Repo to hold veracode related issues and code snippets☆9Updated 7 years ago
- this is a demo set of attacks that can be used to get started with gauntlt☆27Updated 8 years ago
- ☆65Updated 7 years ago
- The invoicer for Chapter 2 of Securing DevOps☆47Updated 2 months ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆44Updated 5 years ago