Yelp / detect-secrets-server
☆108Updated last year
Alternatives and similar repositories for detect-secrets-server:
Users that are interested in detect-secrets-server are comparing it to the libraries listed below
- OWASP Cloud Security - Enabling conversations through threat and control stories☆179Updated 6 years ago
- Content for OWASP Summit 2017 site☆128Updated 4 years ago
- Google Cloud Platform Security Tool☆234Updated 5 years ago
- Monitors Github for leaked secrets☆195Updated 4 months ago
- An application to assist in the organization and prioritization of software security activities.☆138Updated 3 years ago
- ☆57Updated 4 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆193Updated 6 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- for AWS Security material☆246Updated 2 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- ☆63Updated 2 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- ☆82Updated 5 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Example detection of compromise credentials in AWS☆121Updated 6 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆78Updated 7 years ago
- ☆13Updated 6 years ago
- Vendor Security Model Contract☆97Updated 2 years ago
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆76Updated 2 years ago
- INACTIVE - Security Testing Tool☆106Updated 9 years ago
- A simple web app that helps developers understand the ASVS requirements.☆157Updated this week
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆103Updated 2 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆138Updated 9 months ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆59Updated 2 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Repo to hold mapping of user-security-stories☆115Updated 6 years ago
- ThreatSpec - Continuous threat modelling through code - https://threatspec.org☆9Updated 7 years ago
- Unit testing framework for test driven security of AWS, GCP, Heroku and more.☆105Updated last year
- dockscan is security vulnerability and audit scanner for Docker installations☆220Updated 8 years ago