Threagile / run-threagile-action
GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file
☆13Updated last year
Alternatives and similar repositories for run-threagile-action:
Users that are interested in run-threagile-action are comparing it to the libraries listed below
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- ZAP Management Scripts☆23Updated last week
- Maturity Model Collaborative project☆15Updated 2 years ago
- DefectDojo Community Content☆18Updated 6 months ago
- OWASP Foundation Web Respository☆28Updated 8 months ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated last year
- ☆20Updated 6 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- OpenCSPM Community Controls☆14Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated last year
- (WIP) CIS Microsoft Azure Foundations Benchmark☆16Updated 3 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- ☆14Updated 2 years ago
- ☆10Updated 2 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Updated incident response generator for training classes☆44Updated 3 years ago
- OWASP Foundation Web Respository☆27Updated 2 months ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 6 months ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- ☆24Updated 3 years ago
- Stratosphere uses password generation algorithms to discover publicly accessible cloud storage buckets.☆27Updated 3 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- ☆33Updated 3 years ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 2 years ago