AppSecPipeline Specification for DevOps automation.
☆40Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for AppSecPipeline-Specification
Users that are interested in AppSecPipeline-Specification are comparing it to the libraries listed below
Sorting:
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- An application to assist in the organization and prioritization of software security activities.☆139Jun 10, 2021Updated 4 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- This project allows you to run GitHub Dependabot against Azure DevOps repositories at scale, via Azure Pipelines and Azure Functions☆12Sep 22, 2021Updated 4 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Jun 28, 2019Updated 6 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Various git pre-commit or pre-push hooks using http://pre-commit.com/☆11Jan 26, 2016Updated 10 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- Black Duck Detect plugin for Jenkins☆12Nov 25, 2025Updated 3 months ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Nov 22, 2022Updated 3 years ago
- Tool to detect and remediate drift between team projects in Azure DevOps☆16Jun 27, 2023Updated 2 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- Burp-UI is a web-ui for burp backup written in python with Flask and jQuery/Bootstrap☆84Jul 7, 2023Updated 2 years ago
- ☆57Jun 17, 2020Updated 5 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- ☆69Jul 18, 2025Updated 7 months ago
- ☆72Nov 20, 2017Updated 8 years ago
- This repository hosts the download links for LGTM Enterprise.☆19Apr 8, 2022Updated 3 years ago
- ☆20Jul 16, 2025Updated 7 months ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Jan 29, 2019Updated 7 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 5 months ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".☆71Jan 1, 2022Updated 4 years ago
- SentinelOne's SACK CVE Fixer☆22Jul 2, 2019Updated 6 years ago
- Serverless Workshop☆16Dec 8, 2022Updated 3 years ago
- Azure DevOps extension that can publish cross-platform test results to a Test Plan☆40Dec 24, 2025Updated 2 months ago
- ☆78Aug 7, 2015Updated 10 years ago
- This solution demonstrates how to access over SSH an EC2 instance having no SSH key installed on it, no ports open, even no public IP add…☆18Oct 31, 2019Updated 6 years ago
- eXpandable Open Research on Cyber Information Security Management☆23May 10, 2020Updated 5 years ago