☆425Jan 18, 2023Updated 3 years ago
Alternatives and similar repositories for top-10-cicd-security-risks
Users that are interested in top-10-cicd-security-risks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,227Jul 14, 2024Updated last year
- OWASP Foundation Web Respository☆104Dec 22, 2025Updated 4 months ago
- Threat matrix for CI/CD Pipeline☆764Jul 8, 2024Updated last year
- Automating situational awareness for cloud penetration tests.☆2,370Apr 21, 2026Updated 2 weeks ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆2,009May 20, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,042Dec 21, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Open-Source Unified Vulnerability Management, DevSecOps & ASPM☆4,672May 2, 2026Updated last week
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆501Jun 27, 2025Updated 10 months ago
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, wor…☆486Dec 13, 2021Updated 4 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,304May 1, 2026Updated last week
- ☆574Apr 27, 2026Updated last week
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Jan 16, 2024Updated 2 years ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆22May 4, 2023Updated 3 years ago
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆1,057Jan 5, 2026Updated 4 months ago
- OWASP Foundation Web Respository☆613Mar 24, 2026Updated last month
- This repo has been replaced by https://www.cloudvulndb.org☆727Jun 29, 2022Updated 3 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Checklist for container security - devsecops practices☆1,618Sep 15, 2025Updated 7 months ago
- Multi-Cloud Security Auditing Tool☆7,644Sep 23, 2025Updated 7 months ago
- GitGoat is an open source tool that was built to enable DevOps and Engineering teams to design and implement a sustainable misconfigurati…☆173Jan 24, 2025Updated last year
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆738May 1, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,626Apr 16, 2026Updated 3 weeks ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆54Mar 4, 2026Updated 2 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,166Apr 27, 2026Updated last week
- A repository of breaches of AWS customers☆802Mar 30, 2026Updated last month
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,652Apr 6, 2026Updated last month
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,561Apr 28, 2026Updated last week
- Ultimate DevSecOps library☆6,715Mar 5, 2026Updated 2 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,812Apr 6, 2026Updated last month
- Vulnerable app with examples showing how to not use secrets☆1,430Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Supply Chain Security Research - Living Off The Pipeline tools☆150Apr 14, 2026Updated 3 weeks ago
- ☆233Apr 24, 2026Updated 2 weeks ago
- Application Security Verification Standard☆3,418Mar 17, 2026Updated last month
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 4 years ago
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 3 months ago
- A reading list for software supply-chain security.☆365Nov 21, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆17Jun 1, 2022Updated 3 years ago